期刊文献+
共找到203,673篇文章
< 1 2 250 >
每页显示 20 50 100
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
1
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-sERVER HETEROGENEOUs sECURITY
在线阅读 下载PDF
Key Techniques for High-yield and High-efficiency Cultivation of‘Zhouhua 5’Peanut under Film Mulching
2
作者 Chaoyang JIA Yake LEI +3 位作者 Jianhang ZHANG Shijie ZHAN Chenwei DENG Jingbin CUI 《Agricultural Biotechnology》 2026年第1期13-15,25,共4页
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e... With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production. 展开更多
关键词 PEANUT Zhouhua 5 Film mulching key technique
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
3
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks sECURITY
在线阅读 下载PDF
Slope rockbolting using key block theory:Force transfer and artificial intelligence-assisted multi-objective optimisation
4
作者 Jessica Ka Yi Chiu Charlie Chunlin Li +1 位作者 Ole Jakob Mengshoel Vidar Kveldsvik 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第1期73-91,共19页
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u... This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility. 展开更多
关键词 Rock anchoring slope stability 3D modelling key block Parametric design Bio-inspired artificial intelligence(AI)
在线阅读 下载PDF
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach
5
作者 Shereen S.Jumaa Mohsin H.Challoob Amjad J.Humaidi 《Computers, Materials & Continua》 2026年第4期1548-1564,共17页
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military... Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems. 展开更多
关键词 Military image encryption pixel-level scrambling bit-level manipulation block-level shuffling password hashing dynamic encryption key spatial pixel correlation chaotic system
在线阅读 下载PDF
KPA-ViT:Key Part-Level Attention Vision Transformer for Foreign Body Classification on Coal Conveyor Belt
6
作者 Haoxuanye Ji Zhiliang Chen +3 位作者 Pengfei Jiang Ziyue Wang Ting Yu Wei Zhang 《Computers, Materials & Continua》 2026年第3期656-671,共16页
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa... Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness. 展开更多
关键词 Foreign body classification global and part-level key information coal conveyor belt vision transformer(ViT) self and cross attention
在线阅读 下载PDF
Key roles of Young’s modulus and mechanical hysteresis in hydrogel strain sensors for high-fidelity sensing
7
作者 Yuanlai Fang Jialin Li +5 位作者 Zhongxiang Bai Jingjiang Wei Kun Yang Li Yang Qingyuan Wang Jiaxi Cui 《Science China Materials》 2026年第3期1624-1633,共10页
Conductive hydrogel-based stretchable electronics have been extensively investigated,among which strain sensors are the most prominently studied.While the mechanical properties significantly affect the performance of ... Conductive hydrogel-based stretchable electronics have been extensively investigated,among which strain sensors are the most prominently studied.While the mechanical properties significantly affect the performance of these devices,the systematic correlation between specific mechanical parameters and sensing performance remains rarely explored.This work compares the influences of Young’s modulus and mechanical hysteresis on the sensing performance between highly entangled PAM-Li and double-network PAM-Li-Agar-3 strain sensors.Owing to the brittle agar network,which imparts a higher Young’s modulus and pronounced mechanical hysteresis to the double-network PAMLi-Agar-3 hydrogel,the corresponding sensor requires a greater driving force for deformation and yields signals with poor reproducibility.In comparison,the PAM-Li hydrogel,characterized by highly entangled polymer chains,exhibits a lower Young’s modulus and negligible mechanical hysteresis.Consequently,signals from the PAM-Li strain sensor demonstrate enhanced sensitivity and stability.Therefore,this work demonstrates that a low Young’s modulus and minimal mechanical hysteresis are critical factors for achieving superior sensing performance in strain sensors,as systematically validated through comparative analyses across diverse application scenarios. 展开更多
关键词 conductive hydrogel strain sensor Young’s modulus mechanical hysteresis sensing quality
原文传递
Key role of Levitt’s carbon monoxide breath test in revealing coexistent Gilbert syndrome and erythropoietic protoporphyria:A case report
8
作者 Ling-Ling Kang Hou-De Zhang 《World Journal of Clinical Cases》 2026年第1期28-33,共6页
It is challenging to diagnose isolated hyperbilirubinemia with rare and complex etiologies under the constraints of traditional testing conditions.Herein,we present a rare case of coexisting Gilbert syndrome(GS)and er... It is challenging to diagnose isolated hyperbilirubinemia with rare and complex etiologies under the constraints of traditional testing conditions.Herein,we present a rare case of coexisting Gilbert syndrome(GS)and erythropoietic protoporphyria(EPP),which has not been previously documented.CASE SUMMARY We present a rare case of coexisting GS and EPP in a 23-year-old Chinese male with a long history of jaundice and recently found splenomegaly.Serial nonspecific hemolysis screening tests yielded inconsistent results,and investigations for common hemolytic etiologies were negative.However,Levitt’s carbon monoxide breath test,which measures erythrocyte lifespan(the gold-standard marker of hemolysis),demonstrated significant hemolysis,revealing a markedly shortened erythrocyte lifespan of 11 days(normal average 120 days).Genetic testing subsequently confirmed EPP with a homozygous ferrochelatase gene mutation and GS with a heterozygous uridine diphosphate glucuronosyl trans-ferase 1A1 gene mutation.CONCLUSION The rapid,non-invasive Levitt’s carbon monoxide breath test resolved the diagnostic challenge posed by a rare and complex cause of hyperbilirubinemia. 展开更多
关键词 Isolated hyperbilirubinemia Erythropoietic protoporphyria Gilbert syndrome HEMOLYsIs Levitt’s carbon monoxide breath test Erythrocyte lifespan Case report
暂未订购
Blood biomarkers for Alzheimer’s disease:Key challenges of clinical implementation
9
作者 Rafaela Luiza C.Franco Tai R.Hunter Fernanda G.De Felice 《Neural Regeneration Research》 2026年第6期2361-2362,共2页
Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder and the leading cause of dementia worldwide.It is characterized by the accumulation of extracellular amyloid-beta(Aβ)plaques and intracellul... Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder and the leading cause of dementia worldwide.It is characterized by the accumulation of extracellular amyloid-beta(Aβ)plaques and intracellular tau neurofibrillary tangles,leading to synaptic dysfunction,neuronal loss,and cognitive decline.These pathological changes can begin decades before clinical symptoms emerge,highlighting the critical need for early,accessible,and accurate diagnostic tools. 展开更多
关键词 blood biomarkers amyloid beta plaques tau neurofibrillary tanglesleading alzheimer s disease ad clinical implementation Alzheimers disease neurodegenerative disorder diagnostic tools
暂未订购
积石山M_(S)6.2、乌什M_(S)7.1地震前后地电场变化特征研究
10
作者 范莹莹 安张辉 +1 位作者 吴优 林毅 《地震工程学报》 北大核心 2026年第1期197-204,共8页
利用积石山M_(S)6.2地震和乌什M_(S)7.1地震震中周围的地电场台站观测数据,研究地震发生前后地电场能谱值变化。结果表明:(1)在积石山M_(S)6.2地震发生前,武胜驿、松山和平凉等台观测到地电场低频成分能谱值有显著增大的现象;(2)乌什M_(... 利用积石山M_(S)6.2地震和乌什M_(S)7.1地震震中周围的地电场台站观测数据,研究地震发生前后地电场能谱值变化。结果表明:(1)在积石山M_(S)6.2地震发生前,武胜驿、松山和平凉等台观测到地电场低频成分能谱值有显著增大的现象;(2)乌什M_(S)7.1地震发生前,乌什、温泉和乌鲁木齐等台均观测到地电场低频成分能谱值先增大后降低的明显变化;(3)初步分析认为,地震前地电场异常现象主要是由于震源孕育过程中激发的低频电磁辐射传播至台站所致。然而,测区地下介质的形变也可能激发局部区域的低频电磁辐射,这一因素同样不容忽视。 展开更多
关键词 积石山M_(s)6.2地震 乌什M_(s)7.1地震 地电场 能谱 变化特征
在线阅读 下载PDF
2022年云南红河M_(S)5.0地震震源参数测定
11
作者 李姣 姜金钟 +1 位作者 顾慧冬 叶泵 《地震研究》 北大核心 2026年第2期177-189,共13页
针对2022年云南红河M_(S)5.0地震震源深度测定结果存在显著差异的问题,基于云南地震台网记录的宽频带数字波形和区域一维速度模型,利用CAP方法反演了红河地震序列中M_(S)5.0和M_(S)3.5两次地震的震源机制解和最佳震源深度,然后采用sPL... 针对2022年云南红河M_(S)5.0地震震源深度测定结果存在显著差异的问题,基于云南地震台网记录的宽频带数字波形和区域一维速度模型,利用CAP方法反演了红河地震序列中M_(S)5.0和M_(S)3.5两次地震的震源机制解和最佳震源深度,然后采用sPL深度震相进一步测定其震源深度,最后综合震源深度、震源机制解和区域构造地质情况初步探讨了此次地震的发震机理。结果表明:2022年红河M_(S)5.0地震是以右旋走滑型为主、兼具少量逆冲分量的地震,最佳双力偶机制解为节面Ⅰ:33°/75°/18°,节面Ⅱ:298°/73°/164°,震源深度为3~4 km;M_(S)3.5地震最佳双力偶机制解为节面Ⅰ:31°/83°/7°,节面Ⅱ:300°/83°/173°,震源深度为7~8 km。综合此次M_(S)5.0主震震源深度较浅,以及红河断裂带南段断层构造相对北段较为简单等因素,初步分析认为是上地壳断层浅部区域应力积累导致M_(S)5.0主震的发生,主震后的应力调整导致了较深处的M_(S)3.5余震的发生,同时,由于震源区断层构造较为平直简单、应力积累区域较为集中,两次较大地震发生后余震很少。 展开更多
关键词 红河M_(s)5.0地震 震源深度 震源机制解 sPL震相 构造意义
在线阅读 下载PDF
考虑气热动态特性的P2G-CCS综合能源优化调度
12
作者 张涛 王金 +3 位作者 孟衡 刘文丽 司诚真 熊鸣之 《太阳能学报》 北大核心 2026年第1期253-262,共10页
提出考虑气热动态特性的电转气-碳捕集(P2G-CCS)综合能源调度策略。首先,将气热能流特性方程转化至s域,得到二端口传递函数模型,利用卷积定理对其进行Laplace逆变换,从而得到任意时间断面的时域动态模型。其次,在动态模型基础上建立包含... 提出考虑气热动态特性的电转气-碳捕集(P2G-CCS)综合能源调度策略。首先,将气热能流特性方程转化至s域,得到二端口传递函数模型,利用卷积定理对其进行Laplace逆变换,从而得到任意时间断面的时域动态模型。其次,在动态模型基础上建立包含P2G-CCS的IES园区,结合碳交易机制减少碳排放。最后以IEEE-39-20-6为例,建立电-气-热能源系统,通过设置不同调度场景进行对比分析。结果表明,所建动态模型和策略有效提高气热网潮流计算效率的同时,降低碳排放,提高系统调度经济性。 展开更多
关键词 综合能源 P2G-CCs 奖惩阶梯碳交易 气热s域模型
原文传递
Java+SSM架构高校教材征订系统开发
13
作者 曾雪松 尚光龙 张龙龙 《福建电脑》 2026年第1期80-85,共6页
为提升高校教材征订管理的专业化水平与工作效率,本文设计并开发了一款基于Java+SSM架构的高校教材征订管理系统。系统采用B/S结构,利用Java语言与SSM框架开发,结合MySQL数据库,实现了用户管理、教材征订及统计分析等功能。应用实践表明... 为提升高校教材征订管理的专业化水平与工作效率,本文设计并开发了一款基于Java+SSM架构的高校教材征订管理系统。系统采用B/S结构,利用Java语言与SSM框架开发,结合MySQL数据库,实现了用户管理、教材征订及统计分析等功能。应用实践表明,该系统能够将教材征订周期缩短50%以上,错误率降至1%以下,为高校教材管理提供了高效、可靠的数字化解决方案。 展开更多
关键词 JAVA语言 ssM架构 教材征订 管理系统 B/s结构
在线阅读 下载PDF
抗高血压1类新药——221s(2,9)的纯化工艺
14
作者 余丽丽 李明阳 +4 位作者 马瑞龙 杨宽 胡娅琪 刘少静 秦蓓 《当代化工》 2026年第1期79-83,共5页
为了获取抗高血压药物221s(2,9)的快速纯化工艺条件,采用加压柱层析法、砂芯漏斗快速柱层析法以及连续的减压柱层析法对粗产物予以初步分离,且联合重结晶法开展进一步纯化操作。结果表明:当样品硅胶质量比为1∶10时,加压柱层析法分离度... 为了获取抗高血压药物221s(2,9)的快速纯化工艺条件,采用加压柱层析法、砂芯漏斗快速柱层析法以及连续的减压柱层析法对粗产物予以初步分离,且联合重结晶法开展进一步纯化操作。结果表明:当样品硅胶质量比为1∶10时,加压柱层析法分离度良好,与重结晶结合可达成一定纯化成效,然而其效率及纯化产率偏低;砂芯漏斗快速柱层析法虽效率较高,但分离效果欠佳,即便后续进行二次重结晶亦无法实现纯化目的;连续的减压柱层析法在样品硅胶质量比达1∶12时,回收率可达83.5%,粗分离纯度为93.2%,仅通过一次重结晶即可实现纯化目标。经优化后的纯化方法可快速且高效地纯化221s(2,9),为后续中试工艺研究奠定了坚实基础。 展开更多
关键词 221s(2 9) 纯化 工艺 优化 分离 药物 结晶
在线阅读 下载PDF
基于C#和S7-1200 PLC的立体仓库控制系统设计
15
作者 晏华成 芮庆忠 龙涛元 《自动化技术与应用》 2026年第1期6-11,共6页
针对触摸屏监控系统不能满足大中型立体仓库对数据进行存储和处理的功能需求,在Visual Studio 2019集成开发环境中,采用C#语言开发一套立体仓库上位机控制系统。以多线程的方式实时读取库位信息;以S7-1200 PLC作为主控制器,设计产品的... 针对触摸屏监控系统不能满足大中型立体仓库对数据进行存储和处理的功能需求,在Visual Studio 2019集成开发环境中,采用C#语言开发一套立体仓库上位机控制系统。以多线程的方式实时读取库位信息;以S7-1200 PLC作为主控制器,设计产品的自动入库和自动出库程序流程,采用SCL语言设计了库位先进先出的控制程序。C#和S7-1200 PLC之间采用S7通信的方式控制立体仓库的出入库操作和库位信息采集,3年的现场运行情况表明,整个系统能在上位机上对立体仓库进行手动控制和自动控制,能精确快速地进行入库出库操作,运行平稳,上位机上能正确实时显示库位信息,达到了预期的结果。 展开更多
关键词 C# 立体仓库 上位机 多线程 s7-1200 PLC s7通信
在线阅读 下载PDF
基于改进YOLOv5s的水稻秸秆量识别检测方法
16
作者 葛宜元 孙修涵 +3 位作者 孟庆祥 梁秋艳 马浏轩 杜爽 《农机化研究》 北大核心 2026年第2期116-123,共8页
水稻秸秆腐解周期是衡量秸秆还田效果的重要指标。为提升水稻秸秆腐解效果,准确测量留于田间的秸秆量,将水稻收割后的田间秸秆状态分为铺放于田间的堆叠秸秆和根茎留于原位的留茬秸秆两种,并提出了一种基于改进YOLOv5s的水稻秸秆量识别... 水稻秸秆腐解周期是衡量秸秆还田效果的重要指标。为提升水稻秸秆腐解效果,准确测量留于田间的秸秆量,将水稻收割后的田间秸秆状态分为铺放于田间的堆叠秸秆和根茎留于原位的留茬秸秆两种,并提出了一种基于改进YOLOv5s的水稻秸秆量识别算法。采用色彩追踪算法结合HSV模型,对堆叠秸秆量进行检测;通过深度学习算法、OpenCV算法结合HSV模型和注意力模块,对留茬秸秆进行检测;引入CBAM注意力模块,同时通过非极大值抑制去除重叠锚定框,以消除重复计数的影响,从而实现对秸秆量的精准检测。通过训练模块对2174张水稻秸秆图片进行深度学习,识别精确率可达92.092%,召回率为96.144%,目标检测损失值为2.397%。实际田间秸秆检测时,正确检出率可达85.85%。改进后的算法可有效检出留茬秸秆并通过串口返回秸秆数量,为秸秆腐解剂的精量施放和还田模式的建立提供更为精确的数据支持。 展开更多
关键词 水稻秸秆量识别 改进YOLOv5s 注意力机制 图像处理 非极大值抑制
在线阅读 下载PDF
蚕豆11S蛋白淀粉样纤维化聚集的结构表征及其功能特性研究
17
作者 陈慧 周梦园 +5 位作者 许喆 林学镁 赵文忠 许志豪 丁笑琦 丁玉庭 《食品与发酵工业》 北大核心 2026年第1期277-283,共7页
食源性蛋白淀粉样纤维化聚集具有独特的结构特性,蚕豆11S蛋白(fava bean 11S protein,FP)作为一种可持续蛋白资源,表现出巨大的潜力。该研究探究了蚕豆11S蛋白淀粉样纤维化聚集(fibrotic aggregation of 11S protein in fava bean,FPF)... 食源性蛋白淀粉样纤维化聚集具有独特的结构特性,蚕豆11S蛋白(fava bean 11S protein,FP)作为一种可持续蛋白资源,表现出巨大的潜力。该研究探究了蚕豆11S蛋白淀粉样纤维化聚集(fibrotic aggregation of 11S protein in fava bean,FPF)在形成过程中的动态演变,包括其结构表征和功能特性。6 g/100 mL的FP通过酸热处理(pH 2,85℃)不同时间(0~24 h)后得到FPF。处理后的样品通过硫黄素T、荧光、二酪氨酸、透射电子显微镜、傅里叶红外光谱等进行结构表征,结果表明FP先在酸热过程中水解成多肽,再自组装成富含β-折叠结构的FPF(由0 h的34.44%增加到24 h的45.89%)。通过起泡性、乳化性和凝胶特性等对FPF功能特性进行表征,与FP相比,反应24 h后的FPF具有更好的起泡性、乳化性和凝胶特性。此外,FPF在体外细胞实验中没有表现出细胞毒性。研究结果为FPF的形成规律提供了理论支撑。 展开更多
关键词 蚕豆蛋白 11s蛋白 淀粉样纤维化聚集 结构特征 功能特性
在线阅读 下载PDF
miR-21-5p靶向调控SKP2/p27通路参与转化生长因子β1诱导人肾小管上皮细胞纤维化的作用机制
18
作者 雷波 黄建林 刘健男 《临床肾脏病杂志》 2026年第2期162-168,共7页
目的探究miR-21-5p靶向调控S期激酶相关蛋白2(S-phase kinase-associated protein 2,SKP2)/p27通路参与转化生长因子β1(transforming growth factor-β1,TGF-β1)诱导人肾小管上皮细胞纤维化的作用机制。方法将人肾小管上皮细胞(human ... 目的探究miR-21-5p靶向调控S期激酶相关蛋白2(S-phase kinase-associated protein 2,SKP2)/p27通路参与转化生长因子β1(transforming growth factor-β1,TGF-β1)诱导人肾小管上皮细胞纤维化的作用机制。方法将人肾小管上皮细胞(human kidney-2,HK-2)随机分为对照组、模型组(TGF-β1诱导)、miR-NC组、miR-21-5p mimic组、miR-21-5p mimic+pcDNA-NC组与miR-21-5p mimic+SKP2过表达组(miR-21-5p mimic+pcDNA-SKP2组)。采用CCK-8实验检测各组HK-2细胞的活力;酶联免疫吸附测定(enzyme-linked immunosorbent assay,ELISA)法检测各组细胞上清液中肿瘤坏死因子α(tumor necrosis factor-α,TNF-α)、白细胞介素(interleukin,IL)1β的水平;实时荧光定量PCR(real-time quantitative PCR,RT-qPCR)法检测各组HK-2细胞中miR-21-5p、SKP2、p27mRNA的表达;蛋白质印迹法检测各组HK-2细胞中SKP2/p27信号通路相关蛋白表达和纤维化相关蛋白平滑肌肌动蛋白(α-smooth muscle actin,α-SMA)、纤维连接蛋白(fibronectin,Fn)、胶原蛋白Ⅰ(CollagenⅠ)的表达;双荧光素酶报告基因实验探究miR-21-5p与SKP2的靶向关系。结果与对照组比较,模型组48 h细胞活力[(98.42±3.69)%比(67.49±6.21)%]、72 h细胞活力[(101.35±4.20)%比(62.78±6.48)%]、miR-21-5p水平(1.00±0.10比0.34±0.03)、p27 mRNA(1.00±0.11比0.43±0.04)与蛋白表达(0.85±0.09比0.20±0.02)显著降低,差异具有统计学意义(P<0.05);细胞上清液TNF-α[(57.34±8.22)ng/L比(317.59±26.38)ng/L]、IL-1β水平[(73.49±8.56)ng/L比(372.60±27.55)ng/L]、SKP2 mRNA表达水平(1.00±0.09比2.18±0.22)和蛋白表达(0.21±0.02比0.84±0.08)、α-SMA(0.26±0.03比0.97±0.10)、Fn(0.30±0.03比1.04±0.10)、CollagenⅠ(0.17±0.02比0.87±0.09)蛋白表达显著升高,差异具有统计学意义(P<0.05)。与模型组、miR-NC组相比,miR-21-5p mimic组HK-2细胞相关指标变化与上述相反,差异具有统计学意义(P<0.05)。过表达SKP2逆转了过表达miR-21-5p对TGF-β1诱导的HK-2纤维化的抑制作用。miR-21-5p靶向负调控SKP2的表达。结论miR-21-5p能靶向抑制SKP2/p27通路减轻TGF-β1诱导的HK-2纤维化。 展开更多
关键词 微小核糖核酸21-5p s期激酶相关蛋白2/p27通路 转化生长因子Β1 肾小管上皮细胞 纤维化
暂未订购
基于改进YOLOv5s的绝缘子缺陷检测方法
19
作者 彭晏飞 袁晓龙 +1 位作者 赵涛 陈炎康 《高压电器》 北大核心 2026年第1期134-142,共9页
基于无人机航拍的电力巡检成为目前绝缘子缺陷检测方法的主流,但当遇到图像特征不够明显或干扰特征较多等问题时,绝缘子缺陷识别困难,检测精度不高。由此,提出了一种基于改进YOLOv5s的绝缘子缺陷检测方法。首先,重新设计卷积模块,然后... 基于无人机航拍的电力巡检成为目前绝缘子缺陷检测方法的主流,但当遇到图像特征不够明显或干扰特征较多等问题时,绝缘子缺陷识别困难,检测精度不高。由此,提出了一种基于改进YOLOv5s的绝缘子缺陷检测方法。首先,重新设计卷积模块,然后将CA注意力机制与其相融合,并且在主干网络加入注意力机制与颈部网络的特征图进行多尺度特征融合,抑制复杂环境下的干扰特征,专注缺陷特征提取;其次,对空间金字塔池化结构(SPPF)进行改进,扩大感受野,减少被模型过滤掉的有用信息;接着,将Transformer与C3模块中的残差结构(Bottleneck)相结合,增强模型对绝缘子缺陷特征的识别能力;最后,使用K-means算法对数据集进行聚类分析,重新计算最适合的锚框尺寸。在数据集上进行验证,改进后的方法平均精度达到97.4%,召回率达到94.8%,均值平均精度为97.6%,该方法有效提升了复杂环境下的绝缘子缺陷检测能力,进一步满足了对绝缘子缺陷检测精度的需求。 展开更多
关键词 YOLOv5s 绝缘子 注意力机制 缺陷检测 sPPF
在线阅读 下载PDF
基于改进YOLOv5s模型的金属焊缝缺陷检测
20
作者 王树强 芦伟 +1 位作者 张宽 李君伟 《焊接学报》 北大核心 2026年第2期116-125,共10页
为提高γ射线焊缝底片缺陷检测的可靠性,提出一种基于改进YOLOv5s的焊缝缺陷检测模型,实现了在复杂环境下对焊缝底片缺陷的高效准确检测.针对原YOLOv5s模型中卷积网络存在的大量通道和冗余信息问题,首先,在主干网络的C3模块中融入了SCC... 为提高γ射线焊缝底片缺陷检测的可靠性,提出一种基于改进YOLOv5s的焊缝缺陷检测模型,实现了在复杂环境下对焊缝底片缺陷的高效准确检测.针对原YOLOv5s模型中卷积网络存在的大量通道和冗余信息问题,首先,在主干网络的C3模块中融入了SCCONV网络模块,减少了冗余信息并提高模型检测性能;其次,考虑到焊缝缺陷的形态多样、大小不一以及对比度低等特点,引入了卷积注意力模块(CBAM和SE),以增强模型对感兴趣区域的关注度;最后,在边界框回归检测中,采用EIoU损失函数替代传统YOLOv5s中的CIoU损失函数,显著提升了模型的检测精度和鲁棒性.结果表明,改进后的模型在精确度、召回率等指标上均较传统YOLOv5s算法有显著提升,具体表现为准确率提高4.2%、召回率提高3.2%、平均精度均值提高3.4%,进而验证了该方法在γ射线焊缝缺陷检测中的有效性. 展开更多
关键词 YOLOv5s模型 sCCONV卷积 CBAM注意力机制 sE注意力机制 EIoU损失函数
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部