期刊文献+
共找到96,844篇文章
< 1 2 250 >
每页显示 20 50 100
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
1
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
2
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
Rateless Polar Codes with Unequal Error Protection Property
3
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
4
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
5
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 aI+SaST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
6
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
7
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRaNSPORTaTION Improved MCUCN code Upscattering effect absorption by^(3)He
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
8
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
基于外码分块编码的BATS码度优化
9
作者 杨柳 阴慧颖 +2 位作者 马征 刘恒 王士恒 《西南交通大学学报》 北大核心 2026年第1期156-166,共11页
为解决分批稀疏码(BATS码)在现有外码分块编码方案下,外码随机分批导致的数据重复译码及资源浪费问题,系统地研究基于外码分块编码方案的BATS码理论批次数优化与动态适应性问题.首先,在已知丢包率的条件下,构建BATS码批次数消耗分析模型... 为解决分批稀疏码(BATS码)在现有外码分块编码方案下,外码随机分批导致的数据重复译码及资源浪费问题,系统地研究基于外码分块编码方案的BATS码理论批次数优化与动态适应性问题.首先,在已知丢包率的条件下,构建BATS码批次数消耗分析模型,并推导得出最优度值的计算方法,以此应对现有方案在计算理论批次数以及确定最小化批次数消耗的最优度值方面所面临的挑战;其次,针对信道丢包率未知的场景,提出一种基于强化学习的BATS码动态度优化方法,借助智能学习机制,在丢包率未知的情况下实时获取度值;最后,通过仿真实验对所构建的理论模型和提出的动态优化方法进行评估.理论分析结果显示,所构建的基于外码分块的传输模型及其理论批次数计算公式能够精准计算批次数消耗并确定最优度值.仿真结果进一步证明,在丢包率未知的场景下,所提出的强化学习优化方案的平均批次数消耗低于固定度值方案,且在动态信道环境中能够保持良好的性能表现. 展开更多
关键词 分批稀疏码 分块码 传输次数 强化学习
在线阅读 下载PDF
血清lncRNA THRIL、lncRNA NEAT1与新生儿肺炎病情程度及预后的相关性
10
作者 刘鑫 张宏蕊 +2 位作者 沈颖 刁玉巧 樊涛 《实用医学杂志》 北大核心 2026年第2期327-333,共7页
目的探究血清长链非编码RNA肿瘤坏死因子相关异种核糖核蛋白L(lncRNA THRIL)、长链非编码RNA核富集转录本1(lncRNA NEAT1)与新生儿肺炎病情程度、预后的关系。方法选取2022年8月至2024年8月河北医科大学第四医院收治的120例新生儿肺炎... 目的探究血清长链非编码RNA肿瘤坏死因子相关异种核糖核蛋白L(lncRNA THRIL)、长链非编码RNA核富集转录本1(lncRNA NEAT1)与新生儿肺炎病情程度、预后的关系。方法选取2022年8月至2024年8月河北医科大学第四医院收治的120例新生儿肺炎患儿为观察组,根据病情程度分为轻症组(42例)、中症组(40例)和重症组(38例);根据治疗2周后预后情况分为预后良好组(86例)和预后不良组(34例)。同时,选取同期在医院进行健康体检的120例健康新生儿,将其设为对照组。采用实时荧光定量PCR法测定受试新生儿血清lncRNA THRIL、lncRNA NEAT1水平;收集新生儿肺炎患儿临床资料,并检测免疫炎症指标[血清可溶性髓样细胞触发受体-1(sTREM-1)、可溶性白细胞介素2受体(sIL-2R)]。对于新生儿肺炎患儿预后不良的影响因素,采用logistic回归分析进行识别与验证;针对血清lncRNA THRIL和lncRNA NEAT1对患儿不良预后的预测作用,通过受试者工作特征(ROC)曲线分析予以评价,明确两者单独及联合预测的临床价值。结果观察组血清lncRNA THRIL、lncRNA NEAT1水平与对照组相比显著升高(P<0.05);血清lncRNA THRIL、lncRNA NEAT1水平随着新生儿肺炎病情的加重而逐渐升高(P<0.05);与预后良好组相比,预后不良组剖腹产占比、血清sTREM-1、sIL-2R、lncRNA THRIL、lncRNA NEAT1水平均显著升高(P<0.05);血清sIL-2R、lncRNA THRIL、lncRNA NEAT1为新生儿肺炎患儿预后不良的独立危险因素(P<0.05);血清lncRNA THRIL、lncRNA NEAT1、二者联合预测新生儿肺炎患儿发生预后不良的曲线下面积(AUC)分别为0.772、0.808、0.930,二者联合预测的AUC显著高于各指标单独预测的AUC(Z二者联合-lncRNA THRIL=2.347、Z二者联合-lncRNA NEAT1=2.217,P=0.019、0.027)。结论新生儿肺炎患儿血清lncRNA THRIL、lncRNA NEAT1水平均明显升高,二者均是新生儿肺炎预后不良的危险因素,二者联合对新生儿肺炎患儿的预后有较好的预测效果。 展开更多
关键词 新生儿肺炎 长链非编码RNa肿瘤坏死因子相关异种核糖核蛋白L 长链非编码RNa核富集转录本1 病情程度 预后
暂未订购
Construction of a Maritime Knowledge Graph Using GraphRAG for Entity and Relationship Extraction from Maritime Documents 被引量:3
11
作者 Yi Han Tao Yang +2 位作者 Meng Yuan Pinghua Hu Chen Li 《Journal of Computer and Communications》 2025年第2期68-93,共26页
In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shippi... In the international shipping industry, digital intelligence transformation has become essential, with both governments and enterprises actively working to integrate diverse datasets. The domain of maritime and shipping is characterized by a vast array of document types, filled with complex, large-scale, and often chaotic knowledge and relationships. Effectively managing these documents is crucial for developing a Large Language Model (LLM) in the maritime domain, enabling practitioners to access and leverage valuable information. A Knowledge Graph (KG) offers a state-of-the-art solution for enhancing knowledge retrieval, providing more accurate responses and enabling context-aware reasoning. This paper presents a framework for utilizing maritime and shipping documents to construct a knowledge graph using GraphRAG, a hybrid tool combining graph-based retrieval and generation capabilities. The extraction of entities and relationships from these documents and the KG construction process are detailed. Furthermore, the KG is integrated with an LLM to develop a Q&A system, demonstrating that the system significantly improves answer accuracy compared to traditional LLMs. Additionally, the KG construction process is up to 50% faster than conventional LLM-based approaches, underscoring the efficiency of our method. This study provides a promising approach to digital intelligence in shipping, advancing knowledge accessibility and decision-making. 展开更多
关键词 Maritime Knowledge Graph GraphRaG Entity and Relationship Extraction document Management
在线阅读 下载PDF
lncRNA AL133415.1在SH-SY5Y细胞中对波形蛋白基因表达调控的机制研究
12
作者 程毅 邹婷 +2 位作者 李丽华 张雷 周晓辉 《实用老年医学》 2026年第2期126-131,共6页
目的探究长链非编码RNA AL133415.1(lncRNA AL133415.1)对细胞活力、神经元凋亡和氧化应激的影响,并进一步探究其在AD分子机制中的作用。方法选择β-淀粉样蛋白(Aβ)_(1-42)诱导SH-SY5Y细胞来构建AD细胞模型,采用细胞转染质粒构建技术调... 目的探究长链非编码RNA AL133415.1(lncRNA AL133415.1)对细胞活力、神经元凋亡和氧化应激的影响,并进一步探究其在AD分子机制中的作用。方法选择β-淀粉样蛋白(Aβ)_(1-42)诱导SH-SY5Y细胞来构建AD细胞模型,采用细胞转染质粒构建技术调控lncRNA AL133415.1基因,采用RT-PCR检测lncRNA AL133415.1、波形蛋白(VIM)基因在细胞中的表达;采用CCK-8方法检测细胞的繁殖速度;采用流式细胞仪检测细胞凋亡;采用DCFH-DA荧光测定法检测SH-SY5Y细胞内活性氧(ROS)、超氧化物歧化酶(SOD)、丙二醛(MDA)水平;采用Western Blot检测VIM在细胞中的表达;采用激光荧光共聚焦法(CLSM法)检测VIM的荧光强度。结果lncRNA AL133415.1抑制组可以提高SH-SY5Y细胞活性并降低其凋亡率,而lncRNA AL133415.1过表达组显著降低了SH-SY5Y细胞的活性并增加其凋亡率(P均<0.01)。lncRNA AL133415.1表达下调能够提高细胞内SOD活性,降低MDA、ROS活性,而表达上调则会导致细胞内SOD的活性降低,MDA、ROS的活性增加(P均<0.05)。抑制lncRNA AL133415.1的表达可以促使VIM基因的表达,而过表达则会抑制VIM基因的表达(P<0.001)。结论lncRNA AL133415.1沉默可以促进VIM基因的表达,而过表达则会抑制VIM基因的表达,提示可以通过调控lncRNA AL133415.1间接调控VIM基因的表达,从而减少AD的发病。 展开更多
关键词 阿尔茨海默病 长链非编码RNaaL133415.1 波形蛋白 神经炎症
暂未订购
姜黄素调控长链非编码RNA MYOSLID增强头颈鳞癌细胞放疗敏感性的作用机制研究
13
作者 易烛光 岑瑞祥 彭聪 《时珍国医国药》 北大核心 2026年第4期656-663,共8页
目的探讨姜黄素是否通过调控长链非编码RNA MYOSLID增强头颈鳞状细胞癌放疗敏感性,并阐明其机制。方法应用lncRNA转录组测序并结合公共数据筛选姜黄素处理后变化显著的关键lncRNA。将FaDu细胞分为对照组、放疗组、姜黄素组、联合组及MYO... 目的探讨姜黄素是否通过调控长链非编码RNA MYOSLID增强头颈鳞状细胞癌放疗敏感性,并阐明其机制。方法应用lncRNA转录组测序并结合公共数据筛选姜黄素处理后变化显著的关键lncRNA。将FaDu细胞分为对照组、放疗组、姜黄素组、联合组及MYOSLID过表达联合组。采用qRT-PCR检测MYOSLID表达;CCK-8、克隆形成、Transwell和Annexin V/PI流式细胞术评估增殖、侵袭及凋亡;Western blot检测γ-H2AX、p-ATM、p-CHK2和Cleaved PARP等蛋白,分析DNA损伤与修复通路变化。结果生物信息学筛选显示MYOSLID为姜黄素下调关键lncRNA。qRT-PCR证实姜黄素和放疗均降低MYOSLID表达,联合处理降幅最大(P<0.05)。进一步,姜黄素或放疗均抑制FaDu细胞生长,联合组作用最强。而机制研究表明姜黄素或放疗上调γ-H2AX、Cleaved PARP及p-ATM/p-CHK2,联合处理进一步增强DNA损伤并呈p-ATM/p-CHK2抑制趋势;MYOSLID过表达可部分逆转生长抑制效应,并恢复p-ATM/p-CHK2及降低γ-H2AX水平(P<0.05)。结论姜黄素可下调MYOSLID表达,干预DNA损伤修复相关过程,增强放疗诱导的DNA损伤与凋亡,从而提高头颈鳞癌细胞放疗敏感性。MYOSLID在该放疗增敏效应中发挥关键作用,具备潜在干预靶点价值。 展开更多
关键词 姜黄素 MYOSLID 头颈鳞状细胞癌 放射治疗 长链非编码RNa
原文传递
Figma2Code:面向Figma设计稿的自动代码生成方法 被引量:1
14
作者 朱琳 封颖超杰 +8 位作者 朱航 王斯加 朱闽峰 喻晨昊 张钰荟 许达兴 赵德明 冯玉君 陈为 《计算机辅助设计与图形学学报》 北大核心 2025年第2期321-329,共9页
设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Co... 设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Code.首先,通过节点和图层优化提高设计稿元数据质量;其次,采用元数据标注信息的语义理解和图像识别技术识别组件;然后构建一套通用型的中间态数据结构,表示优化后的元数据和识别后的组件属性,以支持多种代码语言的生成;最后,基于模板生成可用代码,并通过函数抽取和元素循环输出提高代码可用性.采用生成代码的复现样式准确度量化评估和基于专家经验的代码可用性定性评估,证明了所提方法的有效性. 展开更多
关键词 设计稿转代码 逆向工程 用户界面 深度学习
在线阅读 下载PDF
长链非编码RNA TUG1通过调节miR-145影响宫颈癌发生发展机制研究
15
作者 迪丽达尔·斯地克 王华芳 胡尔西旦·尼牙孜 《中国实验诊断学》 2026年第1期119-122,共4页
目的探讨长链非编码RNA TUG1在调控miR-145表达水平的作用,分析其对于宫颈癌发生发展机制的影响。方法选取2020年1月到2023年12月新疆医科大学第一附属医院患者宫颈癌组织及细胞株,通过RT-PCR实验和qRT-PCR实验,检测长链非编码RNA TUG1... 目的探讨长链非编码RNA TUG1在调控miR-145表达水平的作用,分析其对于宫颈癌发生发展机制的影响。方法选取2020年1月到2023年12月新疆医科大学第一附属医院患者宫颈癌组织及细胞株,通过RT-PCR实验和qRT-PCR实验,检测长链非编码RNA TUG1、miR-145的表达水平,进行siRNA转染、CCK-8细胞增殖检测、Annexin V-FITC流式细胞术实验以及细胞克隆形成实验,分析si-TUG1、anti-miR-145对宫颈癌细胞株的增殖、凋亡及放射照射敏感性的影响。结果在si-TUG1+anti-miR-145组中,患者放疗后宫颈癌细胞OD值、存活率更低。TUG1的表达水平越低,miR-145表达水平越高,在TUG1低表达、miR-145高表达的情况下,宫颈癌细胞的凋亡率越高。结论miR-145的表达水平是影响宫颈癌发生发展的重要因素,长链非编码RNA TUG1对miR-145的表达水平具有调控作用,两者呈负调控关系,能够为疾病的诊治提供有价值的参考依据。 展开更多
关键词 长链非编码RNa TUG1 调节miR-145 宫颈癌
暂未订购
lncRNA MELTF-AS1在膀胱癌组织中的表达及其对膀胱癌细胞恶性生物学行为的影响
16
作者 齐盼 崔立群 +2 位作者 闫晓晗 王天一 张爱莉 《河北医药》 2026年第2期217-222,共6页
目的检测长链非编码RNA(long non-codingRNA,lncRNA)MELTF-AS1在膀胱癌组织及细胞中的表达,分析其表达与膀胱癌患者肿瘤分期(T分期)之间的关系,并探究MELTF-AS1对细胞增殖、迁移及侵袭等生物学行为的影响。方法收集2021年9月至2022年10... 目的检测长链非编码RNA(long non-codingRNA,lncRNA)MELTF-AS1在膀胱癌组织及细胞中的表达,分析其表达与膀胱癌患者肿瘤分期(T分期)之间的关系,并探究MELTF-AS1对细胞增殖、迁移及侵袭等生物学行为的影响。方法收集2021年9月至2022年10月在河北医科大学第四医院行手术治疗并经病理确诊的42例膀胱癌患者癌组织及其相对应的正常癌旁膀胱尿路上皮组织进行研究。采用实时荧光定量PCR(real time-qPCR)检测MELTF-AS1在膀胱癌组织及膀胱癌细胞株5637、T24、SW780和正常膀胱上皮细胞株SV-HUC-1中的表达水平,分析其与各临床参数之间的关系。构建过表达载体pcDNA3.1-MELTF-AS1与敲低载体si-MELTF-AS1,并分别转染5637、T24及SW780细胞。采用细胞增殖实验(MTS法)、克隆形成实验、划痕实验及Transwell小室侵袭实验,检测过表达或敲低MELTF-AS1对膀胱癌细胞增殖、迁移及侵袭的影响。结果MELTF-AS1在膀胱癌组织中的相对表达量明显高于其相对应的正常癌旁膀胱尿路上皮组织,且与肿瘤浸润深度(T分期)相关,与非肌层浸润性膀胱癌患者相比,肌层浸润性膀胱癌患者的肿瘤组织中MELTF-AS1的表达水平更高,差异有统计学意义(P<0.05)。与SV-HUC-1细胞比较,MELTF-AS1的相对表达量在3株膀胱癌细胞系中均上调,且在5637细胞中MELTF-AS1的表达水平最高,差异有统计学意义(P<0.05)。敲低MELTF-AS1可显著抑制5637细胞的增殖、迁移和侵袭能力,而过表达MELTF-AS1可促进T24细胞的增殖、迁移和侵袭。结论MELTF-AS1在膀胱癌组织及膀胱癌细胞中高表达,促进膀胱癌细胞增殖、迁移及侵袭等生物学行为。 展开更多
关键词 非编码长链RNa MELTF-aS1 膀胱癌 生物学行为
暂未订购
Artificial Intelligence-Powered Legal Document Processing for Medical Negligence Cases: A Critical Review 被引量:1
17
作者 Gobind Naidu Vicknesh Krishnan 《International Journal of Intelligence Science》 2025年第1期10-55,共46页
This critical review looks at the assessment of the application of artificial intelligence in handling legal documents with specific reference to medical negligence cases with a view of identifying its transformative ... This critical review looks at the assessment of the application of artificial intelligence in handling legal documents with specific reference to medical negligence cases with a view of identifying its transformative potentialities, issues and ethical concerns. The review consolidates findings that show the impact of AI in improving the efficiency, accuracy and justice delivery in the legal profession. The studies show increased efficiency in speed of document review and enhancement of the accuracy of the reviewed documents, with time efficiency estimates of 60% reduction of time. However, the review also outlines some of the problems that continue to characterize AI, such as data quality problems, biased algorithms and the problem of the opaque decision-making system. This paper assesses ethical issues related to patient autonomy, justice and non-malignant suffering, with particular focus on patient privacy and fair process, and on potential unfairness to patients. This paper’s review of AI innovations finds that regulations lag behind AI developments, leading to unsettled issues regarding legal responsibility for AI and user control over AI-generated results and findings in legal proceedings. Some of the future avenues that are presented in the study are the future of XAI for legal purposes, utilizing federated learning for resolving privacy issues, and the need to foster adaptive regulation. Finally, the review advocates for Legal Subject Matter Experts to collaborate with legal informatics experts, ethicists, and policy makers to develop the best solutions to implement AI in medical negligence claims. It reasons that there is great potential for AI to have a deep impact on the practice of law but when done, it must do so in a way that respects justice and on the Rights of Individuals. 展开更多
关键词 artificial Intelligence Medical Negligence Legal document Processing Ethical Implications Regulatory Frameworks
在线阅读 下载PDF
lncRNA FGD5-AS1靶向miR-512-3p/RAB31抑制膀胱癌细胞增殖、侵袭和上皮-间质转化
18
作者 李富博 李爱科 +5 位作者 饶井芬 刘宝兴 石方玉 李文鑫 杨春丽 林萍萍 《中国医科大学学报》 北大核心 2026年第1期33-40,共8页
目的探讨长链非编码RNA(lncRNA)FGD5反义RNA 1(FGD5-AS1)、miR-512-3p和Ras相关蛋白31(RAB31)在膀胱癌进展中的作用和调控机制。方法收集2019年1月至2021年12月于承德医学院附属医院行手术治疗的60例膀胱癌患者肿瘤组织及癌旁组织,并体... 目的探讨长链非编码RNA(lncRNA)FGD5反义RNA 1(FGD5-AS1)、miR-512-3p和Ras相关蛋白31(RAB31)在膀胱癌进展中的作用和调控机制。方法收集2019年1月至2021年12月于承德医学院附属医院行手术治疗的60例膀胱癌患者肿瘤组织及癌旁组织,并体外培养膀胱癌细胞系(5637、KU-19-19、T24、UM-UC-3)和正常尿路上皮细胞系(SV-HUC-1)。采用实时定量PCR检测肿瘤组织和癌旁组织以及膀胱癌细胞中FGD5-AS1、miR-512-3p和RAB31 mRNA表达,Pearson相关分析确定膀胱癌患者癌组织中miR-512-3p与FGD5-AS1、RAB31 mRNA表达之间的相关性。将sh-NC、sh-FGD5-AS1、sh-FGD5-AS1和NC抑制剂、sh-FGD5-AS1和miR-512-3p抑制剂转染至T24细胞中,分别记为阴性对照组、FGD5-AS1沉默组、抑制剂对照组、联合组;另设置正常组(不转染)。用CCK-8法检测细胞活力;Transwell小室测定细胞迁移和侵袭能力;Western blotting检测RAB31和E-钙黏蛋白(E-cadherin)、N-钙黏蛋白(N-cadherin)、波形蛋白(vimentin)表达;双萤光素酶报告基因和RNA Pull down实验检测miR-512-3p与FGD5-AS1和RAB31的靶向关系。结果膀胱癌组织与细胞中FGD5-AS1、RAB31 mRNA呈高表达,miR-512-3p呈低表达(P<0.05),且膀胱癌患者癌组织中FGD5-AS1、RAB31 m RNA的表达与mi R-512-3p表达呈负相关,FGD5-AS1与RAB31 mRNA表达呈正相关(r=-0.779、-0.649、0.652,均P<0.001)。沉默FGD5-AS1可上调miR-512-3p表达,下调RAB31 mRNA和蛋白表达,降低细胞活力、迁移和侵袭数以及N-cadherin、vimentin水平,升高E-cadherin水平(P<0.05);敲低miR-512-3p表达可明显减弱沉默FGD5-AS1对膀胱癌T24细胞增殖、迁移和侵袭以及上皮-间质转化(EMT)进程的抑制作用(P<0.05);FGD5-AS1可以海绵化miR-512-3p,而RAB31是miR-512-3p的靶标。结论沉默FGD5-AS1可能通过上调miR-512-3p、下调RAB31表达抑制膀胱癌细胞的增殖、迁移、侵袭和EMT进程。 展开更多
关键词 膀胱癌 增殖 上皮-间质转化 长链非编码RNa FGD5-aS1 miR-512-3p/Ras相关蛋白31
暂未订购
基于RS422接口的FPGA在线升级优化设计
19
作者 焦新泉 杨景灵 《计算机测量与控制》 2026年第2期167-173,181,共8页
随着技术的快速发展,FPGA因其灵活性和高性能在多个领域得到广泛应用;面对不断变化的应用需求,FPGA的在线升级技术成为关键挑战之一;采用了一种基于RS422接口的FPGA在线升级优化设计,充分利用了RS422的长距离传输和抗干扰优势,实现了上... 随着技术的快速发展,FPGA因其灵活性和高性能在多个领域得到广泛应用;面对不断变化的应用需求,FPGA的在线升级技术成为关键挑战之一;采用了一种基于RS422接口的FPGA在线升级优化设计,充分利用了RS422的长距离传输和抗干扰优势,实现了上位机与FPGA开发板之间的稳定通信;通过RS422通信模块接收控制指令和配置数据,FPGA控制模块负责解析指令并对FLASH执行擦除、写入等操作,确保固件的顺利更新;利用ICAP模块和Multiboot功能,设计实现了动态重配置,即使在升级过程中遇到意外情况也能通过Fallback模式恢复;为了进一步提升数据传输的可靠性,引入了RS编码与CRC校验相结合的技术方案;两者结合不仅提高了数据传输的准确性,还增强了系统的纠错能力,有效应对突发错误和噪声干扰,保证了FPGA在线升级过程的安全性和稳定性。 展开更多
关键词 在线升级 RS422接口 ICaP模块 Multiboot Fallback模式 RS编码
在线阅读 下载PDF
Shift in Translation:A Case Study of Translating NFPA 1 Fire Code into Chinese
20
作者 Fang Chen Xinlu Xing Huili Wang 《Journal of Contemporary Educational Research》 2025年第2期1-15,共15页
National Fire codes,mandated by government authorities to tackle technical challenges in fire prevention and control,establish fundamental standards for construction practices.International collaboration in fire prote... National Fire codes,mandated by government authorities to tackle technical challenges in fire prevention and control,establish fundamental standards for construction practices.International collaboration in fire protection technologies has opened avenues for China to access a wealth of documents and codes,which are crucial in crafting regulations and developing a robust,scientific framework for fire code formulation.However,the translation of these codes into Chinese has been inadequate,thereby diminishing the benefits of technological exchange and collaborative learning.This underscores the necessity for comprehensive research into code translation,striving for higher-quality translations guided by established translation theories.In this study,we translated the initial segment of the NFPA 1 Fire Code into Chinese and examined both the source text and target text through the lens of Translation Shift Theory,a concept introduced by Catford.The conclusion culminated in identifying four key shifts across various linguistic levels:lexis,sentences,and groups,to ensure an accurate and precise translation of fire codes.This study offers a through and lucid explanation of how the translator integrates Catford’s theories to solve technical challenges in NFPA 1 Fire Code translation,and establish essential standards for construction translation practices. 展开更多
关键词 Fire code code document JC Catford Translation shift theory
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部