期刊文献+
共找到74,061篇文章
< 1 2 250 >
每页显示 20 50 100
血清lncRNA THRIL、lncRNA NEAT1与新生儿肺炎病情程度及预后的相关性
1
作者 刘鑫 张宏蕊 +2 位作者 沈颖 刁玉巧 樊涛 《实用医学杂志》 北大核心 2026年第2期327-333,共7页
目的探究血清长链非编码RNA肿瘤坏死因子相关异种核糖核蛋白L(lncRNA THRIL)、长链非编码RNA核富集转录本1(lncRNA NEAT1)与新生儿肺炎病情程度、预后的关系。方法选取2022年8月至2024年8月河北医科大学第四医院收治的120例新生儿肺炎... 目的探究血清长链非编码RNA肿瘤坏死因子相关异种核糖核蛋白L(lncRNA THRIL)、长链非编码RNA核富集转录本1(lncRNA NEAT1)与新生儿肺炎病情程度、预后的关系。方法选取2022年8月至2024年8月河北医科大学第四医院收治的120例新生儿肺炎患儿为观察组,根据病情程度分为轻症组(42例)、中症组(40例)和重症组(38例);根据治疗2周后预后情况分为预后良好组(86例)和预后不良组(34例)。同时,选取同期在医院进行健康体检的120例健康新生儿,将其设为对照组。采用实时荧光定量PCR法测定受试新生儿血清lncRNA THRIL、lncRNA NEAT1水平;收集新生儿肺炎患儿临床资料,并检测免疫炎症指标[血清可溶性髓样细胞触发受体-1(sTREM-1)、可溶性白细胞介素2受体(sIL-2R)]。对于新生儿肺炎患儿预后不良的影响因素,采用logistic回归分析进行识别与验证;针对血清lncRNA THRIL和lncRNA NEAT1对患儿不良预后的预测作用,通过受试者工作特征(ROC)曲线分析予以评价,明确两者单独及联合预测的临床价值。结果观察组血清lncRNA THRIL、lncRNA NEAT1水平与对照组相比显著升高(P<0.05);血清lncRNA THRIL、lncRNA NEAT1水平随着新生儿肺炎病情的加重而逐渐升高(P<0.05);与预后良好组相比,预后不良组剖腹产占比、血清sTREM-1、sIL-2R、lncRNA THRIL、lncRNA NEAT1水平均显著升高(P<0.05);血清sIL-2R、lncRNA THRIL、lncRNA NEAT1为新生儿肺炎患儿预后不良的独立危险因素(P<0.05);血清lncRNA THRIL、lncRNA NEAT1、二者联合预测新生儿肺炎患儿发生预后不良的曲线下面积(AUC)分别为0.772、0.808、0.930,二者联合预测的AUC显著高于各指标单独预测的AUC(Z二者联合-lncRNA THRIL=2.347、Z二者联合-lncRNA NEAT1=2.217,P=0.019、0.027)。结论新生儿肺炎患儿血清lncRNA THRIL、lncRNA NEAT1水平均明显升高,二者均是新生儿肺炎预后不良的危险因素,二者联合对新生儿肺炎患儿的预后有较好的预测效果。 展开更多
关键词 新生儿肺炎 长链非编码RNa肿瘤坏死因子相关异种核糖核蛋白L 长链非编码RNa核富集转录本1 病情程度 预后
暂未订购
Figma2Code:面向Figma设计稿的自动代码生成方法 被引量:1
2
作者 朱琳 封颖超杰 +8 位作者 朱航 王斯加 朱闽峰 喻晨昊 张钰荟 许达兴 赵德明 冯玉君 陈为 《计算机辅助设计与图形学学报》 北大核心 2025年第2期321-329,共9页
设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Co... 设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Code.首先,通过节点和图层优化提高设计稿元数据质量;其次,采用元数据标注信息的语义理解和图像识别技术识别组件;然后构建一套通用型的中间态数据结构,表示优化后的元数据和识别后的组件属性,以支持多种代码语言的生成;最后,基于模板生成可用代码,并通过函数抽取和元素循环输出提高代码可用性.采用生成代码的复现样式准确度量化评估和基于专家经验的代码可用性定性评估,证明了所提方法的有效性. 展开更多
关键词 设计稿转代码 逆向工程 用户界面 深度学习
在线阅读 下载PDF
lncRNA FGD5-AS1靶向miR-512-3p/RAB31抑制膀胱癌细胞增殖、侵袭和上皮-间质转化
3
作者 李富博 李爱科 +5 位作者 饶井芬 刘宝兴 石方玉 李文鑫 杨春丽 林萍萍 《中国医科大学学报》 北大核心 2026年第1期33-40,共8页
目的探讨长链非编码RNA(lncRNA)FGD5反义RNA 1(FGD5-AS1)、miR-512-3p和Ras相关蛋白31(RAB31)在膀胱癌进展中的作用和调控机制。方法收集2019年1月至2021年12月于承德医学院附属医院行手术治疗的60例膀胱癌患者肿瘤组织及癌旁组织,并体... 目的探讨长链非编码RNA(lncRNA)FGD5反义RNA 1(FGD5-AS1)、miR-512-3p和Ras相关蛋白31(RAB31)在膀胱癌进展中的作用和调控机制。方法收集2019年1月至2021年12月于承德医学院附属医院行手术治疗的60例膀胱癌患者肿瘤组织及癌旁组织,并体外培养膀胱癌细胞系(5637、KU-19-19、T24、UM-UC-3)和正常尿路上皮细胞系(SV-HUC-1)。采用实时定量PCR检测肿瘤组织和癌旁组织以及膀胱癌细胞中FGD5-AS1、miR-512-3p和RAB31 mRNA表达,Pearson相关分析确定膀胱癌患者癌组织中miR-512-3p与FGD5-AS1、RAB31 mRNA表达之间的相关性。将sh-NC、sh-FGD5-AS1、sh-FGD5-AS1和NC抑制剂、sh-FGD5-AS1和miR-512-3p抑制剂转染至T24细胞中,分别记为阴性对照组、FGD5-AS1沉默组、抑制剂对照组、联合组;另设置正常组(不转染)。用CCK-8法检测细胞活力;Transwell小室测定细胞迁移和侵袭能力;Western blotting检测RAB31和E-钙黏蛋白(E-cadherin)、N-钙黏蛋白(N-cadherin)、波形蛋白(vimentin)表达;双萤光素酶报告基因和RNA Pull down实验检测miR-512-3p与FGD5-AS1和RAB31的靶向关系。结果膀胱癌组织与细胞中FGD5-AS1、RAB31 mRNA呈高表达,miR-512-3p呈低表达(P<0.05),且膀胱癌患者癌组织中FGD5-AS1、RAB31 m RNA的表达与mi R-512-3p表达呈负相关,FGD5-AS1与RAB31 mRNA表达呈正相关(r=-0.779、-0.649、0.652,均P<0.001)。沉默FGD5-AS1可上调miR-512-3p表达,下调RAB31 mRNA和蛋白表达,降低细胞活力、迁移和侵袭数以及N-cadherin、vimentin水平,升高E-cadherin水平(P<0.05);敲低miR-512-3p表达可明显减弱沉默FGD5-AS1对膀胱癌T24细胞增殖、迁移和侵袭以及上皮-间质转化(EMT)进程的抑制作用(P<0.05);FGD5-AS1可以海绵化miR-512-3p,而RAB31是miR-512-3p的靶标。结论沉默FGD5-AS1可能通过上调miR-512-3p、下调RAB31表达抑制膀胱癌细胞的增殖、迁移、侵袭和EMT进程。 展开更多
关键词 膀胱癌 增殖 上皮-间质转化 长链非编码RNa FGD5-aS1 miR-512-3p/Ras相关蛋白31
暂未订购
Correction:Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space
4
作者 Mudassir Khalil Muhammad Imran Sharif +3 位作者 Ahmed Naeem Muhammad Umar Chaudhry Hafiz Tayyab Rauf Adham E.Ragab 《Computers, Materials & Continua》 SCIE EI 2025年第1期1461-1461,共1页
In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab C... In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”. 展开更多
关键词 Deep code CIELaB
在线阅读 下载PDF
中国海洋环境保护法研究的基本特征、热点主题与演化路径——基于CiteSpace知识图谱的可视化分析
5
作者 韩立新 姜泽慧 《中国海洋大学学报(社会科学版)》 2026年第1期35-48,共14页
以中国知网数据库中核心期刊发表的、中国海洋环境保护法领域的572篇学术论文为样本,运用CiteSpace 6.3.R1软件绘制知识图谱并进行解读,得出以下结论:中国海洋环境保护法研究的年度发文量整体呈上升趋势,在2011年渤海湾油田溢油事故发... 以中国知网数据库中核心期刊发表的、中国海洋环境保护法领域的572篇学术论文为样本,运用CiteSpace 6.3.R1软件绘制知识图谱并进行解读,得出以下结论:中国海洋环境保护法研究的年度发文量整体呈上升趋势,在2011年渤海湾油田溢油事故发生后出现研究高峰;该领域虽然尚未形成核心作者群,但形成了以中国海洋大学、大连海事大学等高校为代表的核心机构群;该领域的研究热点包括海洋环境保护具体制度、海洋环境污染损害赔偿,以及针对海洋环境污染的行政执法与刑事司法;现阶段,研究聚焦于生态文明建设背景下海洋环境保护制度完善问题以及蓝碳保护发展问题。为进一步推动美丽中国建设和海洋强国建设,中国海洋环境保护法研究还需要在以下两方面深化探索:在内容上,应关注生态环境法典编纂中海洋环境保护法律制度的定位、绿色低碳航运发展的法治保障、海洋环境保护法的域外适用、国际海洋环境保护法的研究动态;在方法上,应注重推动研究方法的创新。 展开更多
关键词 海洋环境保护法 CITESPaCE 陆海统筹 生态环境法典 生态文明建设
在线阅读 下载PDF
Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR
6
作者 Hailong Wang Junchao Shi 《Computers, Materials & Continua》 SCIE EI 2025年第1期1109-1128,共20页
A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can ... A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition.In the coding number detection stage,Differentiable Binarization Network is used as the backbone network,combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect.In terms of text recognition,using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate the problem of coding recognition errors caused by image color distortion due to variations in lighting and background noise.In addition,model pruning and quantization are used to reduce the number ofmodel parameters to meet deployment requirements in resource-constrained environments.A comparative experiment was conducted using the dataset of tank bottom spray code numbers collected on-site,and a transfer experiment was conducted using the dataset of packaging box production date.The experimental results show that the algorithm proposed in this study can effectively locate the coding of cans at different positions on the roller conveyor,and can accurately identify the coding numbers at high production line speeds.The Hmean value of the coding number detection is 97.32%,and the accuracy of the coding number recognition is 98.21%.This verifies that the algorithm proposed in this paper has high accuracy in coding number detection and recognition. 展开更多
关键词 Can coding recognition differentiable binarization network scene visual text recognition model pruning and quantification transport model
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
7
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol code crimson HaEMORRHaGE Trauma
暂未订购
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
8
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
哮喘患者血清lncRNA HOTTIP和RMRP水平表达及与气道重塑的相关性分析
9
作者 郁芳芳 谢伟国 许群 《现代检验医学杂志》 2026年第1期70-74,85,共6页
目的探究哮喘患者血清长链非编码RNA(lncRNA)HOXA末端转录本反义RNA(HOTTIP)和线粒体RNA处理核糖核酸内切酶RNA组份(RMRP)表达变化及其与气道重塑的相关性。方法选取2022年1月~2024年6月江苏省江阴市人民医院呼吸与危重症医学科收治的... 目的探究哮喘患者血清长链非编码RNA(lncRNA)HOXA末端转录本反义RNA(HOTTIP)和线粒体RNA处理核糖核酸内切酶RNA组份(RMRP)表达变化及其与气道重塑的相关性。方法选取2022年1月~2024年6月江苏省江阴市人民医院呼吸与危重症医学科收治的急性发作期哮喘患者72例为急性发作期组,同期门诊随访哮喘缓解期患者70例为缓解期组,健康体检者142例为健康对照组。采用实时荧光定量聚合酶链反应(qRT-PCR)检测血清lncRNA HOTTIP和RMRP水平。采用多排螺旋CT测量患者肺内气道的内径(L)、外径(D),计算气道壁厚度与气道外径比值(T/D)和管壁面积占支气道总横截面积百分比(WA%)。采用肺功能检测仪检测第一秒用力呼气量(FEV1)、最高呼吸气流(PEF)水平。Spearman相关性分析哮喘患者血清lncRNA HOTTIP和RMRP水平与哮喘控制测试(ACT)评分的关系。Pearson相关性分析哮喘患者血清lncRNA HOTTIP和RMRP水平以及与肿瘤坏死因子-α(TNF-α)、γ干扰素(IFN-γ)、白细胞介素-18(IL-18)水平、气道重塑以及肺功能指标的关系。结果与健康对照组相比,急性发作期组和缓解期组IFN-γ水平显著降低(t=14.161,8.886),TNF-α、IL-18、lncRNA HOTTIP(1.32±0.15、1.15±0.15 vs 1.01±0.14)和RMRP(1.27±0.14、1.16±0.14 vs 1.02±0.13)水平显著升高(t=9.345~28.361);与缓解期组相比,急性发作期组ACT评分、IFN-γ水平显著降低(t=13.344,4.475),TNF-α、IL-18、lncRNA HOTTIP和RMRP水平显著升高(t=6.861~15.675),差异具有统计学意义(均P<0.05)。与健康对照组相比,急性发作期组和缓解期组FEV1、PEF水平显著降低(t=13.346~55.694),T/D、WA%水平显著升高(t=19.145~33.035);与缓解期组相比,急性发作期组FEV1、PEF水平显著降低(t=21.802、21.446),T/D、WA%水平显著升高(t=9.994、10.082),差异具有统计学意义(均P<0.05)。Spearman相关性分析显示哮喘患者血清lncRNA HOTTIP和RMRP水平与ACT评分呈负相关(r=-0.614、-0.399,均P<0.001)。Pearson相关性分析显示,哮喘患者血清lncRNA HOTTIP和RMRP水平呈正相关(r=0.625,P<0.05)。哮喘患者血清lncRNA HOTTIP和RMRP水平与TNF-α(r=0.658、0.632)、IL-18(r=0.584、0.586)、T/D(r=0.604、0.631)、WA%(r=0.597、0.588)水平呈正相关,与IFN-γ(r=-0.587、-0.517)、FEV1(r=-0.568、-0.577)、PEF(r=-0.634、-0.627)水平呈负相关(均P<0.05)。结论哮喘患者血清lncRNA HOTTIP和RMRP水平均呈高表达,与气道重塑和肺功能指标变化有关。 展开更多
关键词 哮喘 长链非编码核糖核酸HOXa末端转录本反义RNa 线粒体RNa处理核糖核酸内切酶RNa组份 气道重塑
暂未订购
Design of Serially Concatenated Two-Level Polar Coded Modulation System with Low-Complexity
10
作者 Zhou Lin Liao Guojun +3 位作者 Xu Lei An Ran Xie Xianzhong Wang Xi 《China Communications》 2025年第1期102-110,共9页
Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitat... Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%. 展开更多
关键词 bit-interleaved coded modulation high-order modulation multilevel coding polar codes
在线阅读 下载PDF
Construction of Constant Rank and Orbit Codes over Finite Chain Rings
11
作者 GUO Ye LIU Xiusheng 《Wuhan University Journal of Natural Sciences》 2025年第3期289-301,共13页
In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over ... In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over finite chain rings and constant dimension codes over the residue fields.In particular,we prove that an orbit submodule code over a finite chain ring is a constant rank code.Finally,for special finite chain ring F_(q)+γF_(q),we define a Gray mapφfrom(F_(q)+γF_(q))^(n)to F^(2n)_(q),and by using cyclic codes over F_(q)+γF_(q),we obtain a method of constructing an optimum distance constant dimension code over F_(q). 展开更多
关键词 finite chain ring rank of linear codes constant rank codes orbit codes
原文传递
Neural Codes Constructs Based on Combinatorial Design
12
作者 Jin Huang 《Applied Mathematics》 2025年第1期42-60,共19页
Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into... Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into neuroscience, proposing the concept of combinatorial neural codes. And it was further studied in depth using algebraic methods by C. Curto. In this paper, we construct a class of combinatorial neural codes with special properties based on classical combinatorial structures such as orthogonal Latin rectangle, disjoint Steiner systems, groupable designs and transversal designs. These neural codes have significant weight distribution properties and large minimum distances, and are thus valuable for potential applications in information representation and neuroscience. This study provides new ideas for the construction method and property analysis of combinatorial neural codes, and enriches the study of algebraic coding theory. 展开更多
关键词 Combinatorial Neural codes Orthogonal Latin Rectangle Steiner System Group Divisible Design Transversal Design
在线阅读 下载PDF
Blind recognition of polar code parameters based on log-likelihood ratio
13
作者 ZHONG Zhaogen XIE Cunxiang JIN Kun 《Journal of Systems Engineering and Electronics》 2025年第3期642-658,共17页
The syndrome a posteriori probability of the log-likelihood ratio of intercepted codewords is used to develop an algorithm that recognizes the polar code length and generator matrix of the underlying polar code.Based ... The syndrome a posteriori probability of the log-likelihood ratio of intercepted codewords is used to develop an algorithm that recognizes the polar code length and generator matrix of the underlying polar code.Based on the encoding structure,three theorems are proved,two related to the relationship between the length and rate of the polar code,and one related to the relationship between frozen-bit positions,information-bit positions,and codewords.With these three theorems,polar codes can be quickly reconstruced.In addition,to detect the dual vectors of codewords,the statistical characteristics of the log-likelihood ratio are analyzed,and then the information-and frozen-bit positions are distinguished based on the minimumerror decision criterion.The bit rate is obtained.The correctness of the theorems and effectiveness of the proposed algorithm are validated through simulations.The proposed algorithm exhibits robustness to noise and a reasonable computational complexity. 展开更多
关键词 code length frozen-bit position information-bit position log-likelihood ratio polar code
在线阅读 下载PDF
Shift in Translation:A Case Study of Translating NFPA 1 Fire Code into Chinese
14
作者 Fang Chen Xinlu Xing Huili Wang 《Journal of Contemporary Educational Research》 2025年第2期1-15,共15页
National Fire codes,mandated by government authorities to tackle technical challenges in fire prevention and control,establish fundamental standards for construction practices.International collaboration in fire prote... National Fire codes,mandated by government authorities to tackle technical challenges in fire prevention and control,establish fundamental standards for construction practices.International collaboration in fire protection technologies has opened avenues for China to access a wealth of documents and codes,which are crucial in crafting regulations and developing a robust,scientific framework for fire code formulation.However,the translation of these codes into Chinese has been inadequate,thereby diminishing the benefits of technological exchange and collaborative learning.This underscores the necessity for comprehensive research into code translation,striving for higher-quality translations guided by established translation theories.In this study,we translated the initial segment of the NFPA 1 Fire Code into Chinese and examined both the source text and target text through the lens of Translation Shift Theory,a concept introduced by Catford.The conclusion culminated in identifying four key shifts across various linguistic levels:lexis,sentences,and groups,to ensure an accurate and precise translation of fire codes.This study offers a through and lucid explanation of how the translator integrates Catford’s theories to solve technical challenges in NFPA 1 Fire Code translation,and establish essential standards for construction translation practices. 展开更多
关键词 Fire code code document JC Catford Translation shift theory
在线阅读 下载PDF
Binary Code Similarity Detection:Retrospective Review and Future Directions
15
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computers, Materials & Continua》 2025年第12期4345-4374,共30页
Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation va... Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications. 展开更多
关键词 Binary code similarity detection semantic code representation graph-based modeling representation learning large language models
在线阅读 下载PDF
Research on deep learning decoding method for polar codes in ACO-OFDM spatial optical communication system
16
作者 LIU Kangrui LI Ming +2 位作者 CHEN Sizhe QU Jiashun ZHOU Ming’ou 《Optoelectronics Letters》 2025年第7期427-433,共7页
Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbule... Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder. 展开更多
关键词 frequency conduction polar codes deep learning signal demodulation deep learning technique DECODING aCO OFDM polarization code decoding
原文传递
A Path to Recognizing Intellectual Property Contracts as Nominate Contracts in the Post-Civil Code Era
17
作者 Li Hao 《科技与法律(中英文)》 2025年第6期124-137,共14页
The Book on Contracts of the Civil Code does not recognize"intellectual property contracts"as nominate contracts.Owing to both substantive and structural shortcomings,the Chapter on Technology Contracts fall... The Book on Contracts of the Civil Code does not recognize"intellectual property contracts"as nominate contracts.Owing to both substantive and structural shortcomings,the Chapter on Technology Contracts falls short of providing comprehensive regulation of transactions involving intellectual property,and its Article 876 linking clause has given rise to legal controversies over application by reference and priority of application.There is therefore an urgent need to recognize intellectual property contracts as a nominate category.The rules on such contracts that are dispersed across standalone intellectual property statutes,specialized regulations,adjudicated cases,and judicial interpretations have already produced decodification and should be integrated in the course of enacting the Intellectual Property Code,so as to achieve the recodification of contracts concerning intellectual property.Specifically,the Chapter on Contracts should consist of two parts,General Provisions and Nominate Contracts,to articulate the common features and specific rules of the various contract types while confirming the applicability of the General Provisions in the Book on Contracts.In this way,systemic disorder from mechanically adding nominate contracts to the Civil Code and unnecessary complexity from creating a separate sectoral contract code can both be avoided,and the status of the Book on Contracts as the basic law in the field of contract can be preserved. 展开更多
关键词 contract section decodification re-codification intellectual property code
在线阅读 下载PDF
Lightweight Deep Learning Model and Novel Dataset for Restoring Damaged Barcodes and QR Codes in Logistics Applications
18
作者 Tarek Muallim Haluk Kucuk +1 位作者 Muhammet Bareket Metin Kahraman 《Computer Modeling in Engineering & Sciences》 2025年第6期3557-3581,共25页
This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional(1D)barcodes and Quick Response(QR)codes,addressing critical challenges in logistics ope... This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional(1D)barcodes and Quick Response(QR)codes,addressing critical challenges in logistics operations.The proposed solution leverages an efficient Pix2Pix-based framework,a type of conditional Generative Adversarial Network(GAN)optimized for image-to-image translation tasks,enabling the recovery of degraded barcodes and QR codes with minimal computational overhead.A core contribution of this work is the development of a synthetic dataset that simulates realistic damage scenarios frequently encountered in logistics environments,such as low contrast,misalignment,physical wear,and environmental interference.By training on this diverse and realistic dataset,the model demonstrates exceptional performance in restoring readability and decoding accuracy.The lightweight architecture,featuring a U-Net-based encoder-decoder with separable convolutions,ensures computational efficiency,making the approach suitable for real-time deployment on embedded and resource-constrained devices commonly used in logistics systems.Experimental results reveal significant improvements:QR code decoding ratios increased from 14%to 99%on training data and from 15%to 68%on validation data,while 1D barcode decoding ratios improved from 7%to 73%on training data and from 9%to 44%on validation data.By providing a robust,resource-efficient solution for restoring damaged barcodes and QR codes,this study offers practical advancements for enhancing the reliability of automated scanning systems in logistics operations,particularly under challenging conditions. 展开更多
关键词 BaRcode quick response code RESTORaTION applied deep learning
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
19
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Minimal Binary Codes over a Ring
20
作者 PAN Yang GUO Yuxin YE Chang 《湖州师范学院学报》 2025年第2期1-7,共7页
We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh t... We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh transformation.By Gray mapping,we obtain a family of minimal binary linear codes from a generic construction,which have prominent applications in secret sharing and secure two-party computation. 展开更多
关键词 Boolean function trace function minimal code secret sharing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部