期刊文献+
共找到306,078篇文章
< 1 2 250 >
每页显示 20 50 100
Slip rate and locking degree of Haiyuan fault zone,northeastern Qinghai-Xizang plateau,based on refined block model and GPS data
1
作者 Yang Liu Yuxuan Qiu +2 位作者 Jialiang Liu Yu Zhang Caijun Xu 《Geodesy and Geodynamics》 2025年第5期536-545,共10页
As a major fault in the northeastern Qinghai-Xizang Plateau,the Haiyuan fault zone is important for understanding the regional deformation.Aiming at the differences in the slip rate and locking degree obtained from di... As a major fault in the northeastern Qinghai-Xizang Plateau,the Haiyuan fault zone is important for understanding the regional deformation.Aiming at the differences in the slip rate and locking degree obtained from different studies,this study constructs a refined block model(including Qilian,Alxa,Ordos,Xining,Haiyuan,and Lanzhou blocks)and uses the grid search and simulated annealing methods to invert GPS data for slip rate and locking degree of the Haiyuan fault zone.The results are as follows:(1)The sinistral slip rates in the western,middle,and eastern segments are 4.93-5.22 mm/a,1.52-4.94 mm/a,and 0.43-1.18 mm/a,decreasing eastward on the whole,while the compression rates are 0.45-1.26 mm/a,0.58-2.62 mm/a,and3.52-4.48 mm/a,increasing eastward on the whole.(2)The locking depth of the western segment increases from about 5 km to about 20 km eastward;the middle segment decreases and then increases eastward;the eastern segment concentrates at about 20 km(PHI is about 0.86).(3)The slip deficit is relatively higher in the Lenglongling,Jinqianghe,Maomaoshan,and Liupanshan faults(averaging about 3.42 mm/a,4.16 mm/a,4.23 mm/a,and 3.43 mm/a within 20 km).(4)The Qilian,Alxa,Xining,Lanzhou,and Haiyuan blocks rotate clockwise,while the Ordos block rotates counterclockwise.Additionally,by comparing different block models,the Haiyuan block should be considered independently.The Haiyuan fault zone adjusts surrounding block movements and uplifts Liupanshan mountain tectonically.The results can provide important references for understanding the regional earthquake risk and deformation mechanism. 展开更多
关键词 Haiyuan fault zone block model Locking degree Slip rate
原文传递
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
2
作者 Shenjian Xiao Xiaoli Qin +1 位作者 Yanzhao Tian Zhongkai Dang 《Computers, Materials & Continua》 2025年第5期2351-2373,共23页
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu... The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions. 展开更多
关键词 Multi-authority attribute based encryption blockchain data sharing access control
在线阅读 下载PDF
Blockchain-based knowledge-aware semantic communications for remote driving image transmission
3
作者 Yangfei Lin Tutomu Murase +3 位作者 Yusheng Ji Wugedele Bao Lei Zhong Jie Li 《Digital Communications and Networks》 2025年第2期317-325,共9页
Remote driving,an emergent technology enabling remote operations of vehicles,presents a significant challenge in transmitting large volumes of image data to a central server.This requirement outpaces the capacity of t... Remote driving,an emergent technology enabling remote operations of vehicles,presents a significant challenge in transmitting large volumes of image data to a central server.This requirement outpaces the capacity of traditional communication methods.To tackle this,we propose a novel framework using semantic communications,through a region of interest semantic segmentation method,to reduce the communication costs by transmitting meaningful semantic information rather than bit-wise data.To solve the knowledge base inconsistencies inherent in semantic communications,we introduce a blockchain-based edge-assisted system for managing diverse and geographically varied semantic segmentation knowledge bases.This system not only ensures the security of data through the tamper-resistant nature of blockchain but also leverages edge computing for efficient management.Additionally,the implementation of blockchain sharding handles differentiated knowledge bases for various tasks,thus boosting overall blockchain efficiency.Experimental results show a great reduction in latency by sharding and an increase in model accuracy,confirming our framework's effectiveness. 展开更多
关键词 Semantic communication Remote driving Semantic segmentation blockchain Knowledge base management
在线阅读 下载PDF
Deep Reinforcement Learning-based Multi-Objective Scheduling for Distributed Heterogeneous Hybrid Flow Shops with Blocking Constraints
4
作者 Xueyan Sun Weiming Shen +3 位作者 Jiaxin Fan Birgit Vogel-Heuser Fandi Bi Chunjiang Zhang 《Engineering》 2025年第3期278-291,共14页
This paper investigates a distributed heterogeneous hybrid blocking flow-shop scheduling problem(DHHBFSP)designed to minimize the total tardiness and total energy consumption simultaneously,and proposes an improved pr... This paper investigates a distributed heterogeneous hybrid blocking flow-shop scheduling problem(DHHBFSP)designed to minimize the total tardiness and total energy consumption simultaneously,and proposes an improved proximal policy optimization(IPPO)method to make real-time decisions for the DHHBFSP.A multi-objective Markov decision process is modeled for the DHHBFSP,where the reward function is represented by a vector with dynamic weights instead of the common objectiverelated scalar value.A factory agent(FA)is formulated for each factory to select unscheduled jobs and is trained by the proposed IPPO to improve the decision quality.Multiple FAs work asynchronously to allocate jobs that arrive randomly at the shop.A two-stage training strategy is introduced in the IPPO,which learns from both single-and dual-policy data for better data utilization.The proposed IPPO is tested on randomly generated instances and compared with variants of the basic proximal policy optimization(PPO),dispatch rules,multi-objective metaheuristics,and multi-agent reinforcement learning methods.Extensive experimental results suggest that the proposed strategies offer significant improvements to the basic PPO,and the proposed IPPO outperforms the state-of-the-art scheduling methods in both convergence and solution quality. 展开更多
关键词 Multi-objective Markov decision process Multi-agent deep reinforcement learning Proximal policy optimization Distributed hybrid flow-shop scheduling blocking constraints
在线阅读 下载PDF
Enhancing resistance to bacterial blight in rice using CRISPR-based base editing technology 被引量:1
5
作者 Chenhao Li Bo Liu +1 位作者 Hansong Dong Bing Yang 《The Crop Journal》 2025年第1期115-124,共10页
Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is cruci... Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is crucial to advancing rice breeding program and supporting smallholder farmers.Transcription Activator-Like effectors(TALes)are key virulence factors in Xoo,with some targeting the susceptibility(S)genes such as the sugar transporter SWEET genes in rice.Among these,SWEET14 is an important S gene,with its promoter bound by the TALe TalC which exists across all sequenced African Xoo isolates.In the present study,we utilized CRISPR/Cas9-based cytidine and adenine base editors to alter the effector binding element(EBE)of TalC in the promoter of SWEET14 in rice cultivars Kitaake,IR24,and Zhonghua 11.Mutations with C to T changes in EBE led to reduced SWEET14 induction by TalC-containing Xoo strains,resulting in resistance to African Xoo isolates reliant on TalC for virulence.Conversely,A to G changes retained SWEET14 inducibility and susceptibility to Xoo in edited lines.Importantly,no off-target mutations were detected at predicted sites,and the edited lines exhibited no obvious defects in major agronomic traits in Kitaake.These results underscore the effectiveness of base editing systems for both molecular biology research and crop improvement endeavors. 展开更多
关键词 base editing base editors CBE and ABE Rice improvement Bacterial blight resistance
在线阅读 下载PDF
Knowledge-Based Curved Block Construction Scheduling and Application in Shipbuilding 被引量:1
6
作者 JIANG Zuhua ZHOU Hongming +1 位作者 TAO Ningrong LI Baihe 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第5期759-765,共7页
To increase efficiency in fierce competition,it is necessary and urgent to improve the standard of production planning for shipbuilding.The construction of curved blocks is the bottleneck to improve the efficiency of ... To increase efficiency in fierce competition,it is necessary and urgent to improve the standard of production planning for shipbuilding.The construction of curved blocks is the bottleneck to improve the efficiency of shipbuilding.Thus it is a key breakthrough for higher shipbuilding productivity to study the curved block production.By analyzing the scheduling problem in curved blocks production,we propose an intelligent curved block production scheduling method and its system based on a knowledge base,and show the main process of the system.The functions of the system include data management,assembly plan generation,plan adjustment,and plan evaluation.In order to deal with the actual situation and inherit the empirical knowledge,the system extracts some rules to control block selecting,algorithm selection,and evaluation thresholds to build a production decision-making knowledge base in the curved block scheduling system.The proposed knowledge base could be referred and modified by users,especially after a few interactions between the users and the knowledge base.The final assembly plan can be visualized and evaluated to facilitate the observation of plan implementation and effects of the decisions in the process.Finally,the system is verified by a large shipyard in Shanghai using real data and the results illustrate that the proposed method can perform the knowledge-based scheduling for curved blocks construction effectively. 展开更多
关键词 intelligent scheduling knowledge base ship assembly production curved block
原文传递
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
7
作者 Binyong Li Liangming Deng +1 位作者 Jie Zhang Xianhui Deng 《Computers, Materials & Continua》 SCIE EI 2025年第1期407-426,共20页
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions. 展开更多
关键词 Automotive industry chain cross-domain access block chain delegate authority trust assessment
在线阅读 下载PDF
Malicious Document Detection Based on GGE Visualization
8
作者 Youhe Wang Yi Sun +1 位作者 Yujie Li Chuanqi Zhou 《Computers, Materials & Continua》 SCIE EI 2025年第1期1233-1254,共22页
With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers ... With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers has become particularly urgent.Currently,detection methods based on document structure and behavioral features encounter challenges in feature engineering,these methods not only have limited accuracy,but also consume large resources,and usually can only detect documents in specific formats,which lacks versatility and adaptability.To address such problems,this paper proposes a novel malicious document detection method-visualizing documents as GGE images(Grayscale,Grayscale matrix,Entropy).The GGE method visualizes the original byte sequence of the malicious document as a grayscale image,the information entropy sequence of the document as an entropy image,and at the same time,the grayscale level co-occurrence matrix and the texture and spatial information stored in it are converted into grayscale matrix image,and fuses the three types of images to get the GGE color image.The Convolutional Block Attention Module-EfficientNet-B0(CBAM-EfficientNet-B0)model is then used for classification,combining transfer learning and applying the pre-trained model on the ImageNet dataset to the feature extraction process of GGE images.As shown in the experimental results,the GGE method has superior performance compared with other methods,which is suitable for detecting malicious documents in different formats,and achieves an accuracy of 99.44%and 97.39%on Portable Document Format(PDF)and office datasets,respectively,and consumes less time during the detection process,which can be effectively applied to the task of detecting malicious documents in real-time. 展开更多
关键词 Malicious document VISUALIZATION EfficientNet-B0 convolutional block attention module GGE image
在线阅读 下载PDF
Planning of a Single Flow Channel in Valve Blocks Based on Additive Manufacturing and the Ant Colony Algorithm 被引量:2
9
作者 Jin Zhang Ziyang Li +3 位作者 Yuying Zhang Yandong Liu Ying Li Xiangdong Kong 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第5期191-202,共12页
As electro-hydrostatic actuator(EHA)technology advances towards lightweight and integration,the demand for enhanced internal flow pathways in hydraulic valve blocks intensifies.However,owing to the constraints imposed... As electro-hydrostatic actuator(EHA)technology advances towards lightweight and integration,the demand for enhanced internal flow pathways in hydraulic valve blocks intensifies.However,owing to the constraints imposed by traditional manufacturing processes,conventional hydraulic integrated valve blocks fail to satisfy the demands of a more compact channel layout and lower energy dissipation.Notably,the subjectivity in the arrangement of internal passages results in a time-consuming and labor-intensive process.This study employed additive manufacturing technology and the ant colony algorithm and B-spline curves for the meticulous design of internal passages within an aviation EHA valve block.The layout environment for the valve block passages was established,and path optimization was achieved using the ant colony algorithm,complemented by smoothing using B-spline curves.Three-dimensional modeling was performed using SolidWorks software,revealing a 10.03%reduction in volume for the optimized passages compared with the original passages.Computational fluid dynamics(CFD)simulations were performed using Fluent software,demonstrating that the algorithmically optimized passages effectively prevented the occurrence of vortices at right-angled locations,exhibited superior flow characteristics,and concurrently reduced pressure losses by 34.09%-36.36%.The small discrepancy between the experimental and simulation results validated the efficacy of the ant colony algorithm and B-spline curves in optimizing the passage design,offering a viable solution for channel design in additive manufacturing. 展开更多
关键词 Hydraulic valve block Flow channel B-spline curve Additive manufacturing Ant colony algorithm
在线阅读 下载PDF
Evolutionary Particle Swarm Optimization Algorithm Based on Collective Prediction for Deployment of Base Stations
10
作者 Jiaying Shen Donglin Zhu +5 位作者 Yujia Liu Leyi Wang Jialing Hu Zhaolong Ouyang Changjun Zhou Taiyong Li 《Computers, Materials & Continua》 SCIE EI 2025年第1期345-369,共25页
The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(I... The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of living.In a specific area,achieving higher signal coverage with fewer base stations has become an urgent problem.Therefore,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as ECPPSO.Introducing a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by PSO.ECPPSO also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization problems.To better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base stations.The experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches 80.These results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and effectiveness.Further ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO. 展开更多
关键词 Particle swarm optimization effective coverage area global optimization base station deployment
在线阅读 下载PDF
CRB:A new rumor blocking algorithm in online social networks based on competitive spreading model and influence maximization 被引量:1
11
作者 董晨 徐桂琼 孟蕾 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期588-604,共17页
The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is sprea... The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time. 展开更多
关键词 online social networks rumor blocking competitive linear threshold model influence maximization
原文传递
Design,synthesis,and detection of Al^(3+)of two zinc complexes based on Schiff base ligands
12
作者 YANG Yuanyu XUE Jianhua +3 位作者 BAI Yujia CUI Lulu YANG Dongdong MA Qi 《无机化学学报》 北大核心 2025年第6期1207-1216,共10页
Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-... Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-4-methoxybenzaldehyde and 2-hydroxy-3-methoxybenzaldehyde ligands,respectively,where H_(2)L1=5-methoxy-2-(phthalazin-1-ylhydrazonomethyl)-phenol,H_(2)L2=2-methoxy-6-(phthalazin-1-yl-hydrazonomethyl)-phenol,HL3=2-(1,8-dihydro-[1,2,4]triazolo[3,4-α]phthalazin-3-yl)-6-methoxy-phenol.Complexes 1 and 2 were characterized by infrared spectroscopy,elemental analysis,single-crystal X-ray diffraction,powder X-ray diffraction,etc.It is worth noting that the cinnolin-3-yl-hydrazine ligand and 2-hydroxy-3-methoxybenzaldehyde form two types of Schiff bases(H_(2)L2 and HL3)when in situ reacting and coordinating with Zn(Ⅱ),and HL3 also has two coordination modes.In addition,the fluorescence performance showed that complex 1 can achieve selective and sensitive sensing of Al^(3+)in water with a detection limit of 6.37μmol·L^(-1).CCDC:2413978,1;2413979,2. 展开更多
关键词 Zn-complex Schiff base FLUORESCENCE Al^(3+)detection
在线阅读 下载PDF
Crystal structure and antibacterial activity of two Gd_(2)complexes based on polydentate Schiff-base ligands
13
作者 ZHANG Yingyue KANG Liuqing +2 位作者 YANG Yating GUAN Xiaofen WANG Wenmin 《无机化学学报》 北大核心 2025年第9期1867-1877,共11页
Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene... Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene]-2-hydroxyacetohydrazide,H_(2)L_(2)=(E)-N'-(5-bromo-2-hydroxy-3-methoxybenzylidene)nicotinohydrazide,Hdbm=dibenzoylmethane,have been constructed by adopting the solvothermal method.Structural characterization unveils that both complexes 1 and 2 are constituted by two Gd^(3+)ions,two dbm-ions,two CH_(3)OH molecules,and two polydentate Schiff-base ligands(HL_(1)^(2-)or L_(2)^(2-)).In addition,complex 1 contains four free methanol molecules,whereas complex 2 harbors two free methanol molecules.By investigating the interactions between complexes 1 and 2 and four types of bacteria(Bacillus subtilis,Escherichia coli,Staphylococcus aureus,Candida albicans),it was found that both complexes 1 and 2 exhibited potent antibacte-rial activities.The interaction mechanisms between the ligands H_(3)L_(1),H_(2)L_(2),complexes 1 and 2,and calf thymus DNA(CT-DNA)were studied using ultraviolet-visible spectroscopy,fluorescence titration,and cyclic voltammetry.The results demonstrated that both complexes 1 and 2 can intercalate into CT-DNA molecules,thereby inhibiting bacterial proliferation to achieve the antibacterial effects.CCDC:2401116,1;2401117,2. 展开更多
关键词 Gd_(2)complex polydentate Schiff base crystal structure DNA INTERACTION antibacterial activity
在线阅读 下载PDF
Impact of Information and Communication Technologies Based Initiatives: An Attitudinal Change in Students and Teachers
14
作者 Surya Narayan Gupta Manohar Sah Akhilesh Chaube 《Applied Mathematics》 2025年第2期190-199,共10页
There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered ... There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered information and communication technology’s significance in the field of education. It has not only affected learners but also to the teachers. This paper explores how ICT-based projects affect teachers’ and students’ attitudes. The data was collected through self-prepared attitude scale. It was distributed among the teachers and students of various schools. Two hundred students and one hundred twenty teachers responded to the questionnaire. Analysis was done through the data collected from the teachers as well as from students. The study’s conclusions demonstrated that while there was no significant variation in the attitudes of teachers utilizing different ICT-based programs, there was a substantial difference in the students’ attitude toward learning with different ICT-based programs. 展开更多
关键词 ICT based Initiatives ICT Teacher’s Attitude Student’s Attitude
在线阅读 下载PDF
Call forpapers SI: Target-based drug screening
15
《Journal of Pharmaceutical Analysis》 2025年第1期F0004-F0004,共1页
Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand... Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand binding structure,dynamics and affinity.Currently,the four mainstream drug targets are G protein-coupled receptors(GPCRs),kinases,ion channels,and nuclear receptors,accounting for over 70%of effective drug targets,most of which are membrane proteins and enzymes.In recent years,various new drug targets have been continuously discovered,and the research focus has shifted from simple affinity analysis to high-throughput and high-content screening,as well as exploring drug-target interaction modes.These deepen reliance on the analytical techniques to have higher sensitivity,recognition specificity,and applicability to diversified target structures,which promoting the rapid development of novel screening methods. 展开更多
关键词 nuclear receptorsaccounting target based drug screening phenotype based methods membrane proteins drug screening drug targets protein ligand binding drug screeningtarget based
暂未订购
A rhombic Dy_(4)-based complex showing remarkable single-molecule magnet behavior
16
作者 HOU Yinling JI Jia +5 位作者 YU Hong BIAN Xiaoyun GUAN Xiaofen QIU Jing REN Shuyi FANG Ming 《无机化学学报》 北大核心 2025年第3期605-612,共8页
A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in... A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in detail.Xray diffraction analysis shows that complex 1 belongs to the monoclinic crystal system and its space group is P2_1/n,which contains a rhombic Dy_(4)core.Magnetic measurements of 1 suggest it possesses extraordinary single-molecule magnet(SMM)behavior.Its energy barrier U_(eff)/k_(B)was 116.7 K,and the pre-exponential coefficient τ_(0)=1.05×10~(-8)s.CCDC:2359322. 展开更多
关键词 tetranuclear Dy(Ⅲ)complex Schiff base ligand crystal structure magnetic property single⁃molecule magnet
在线阅读 下载PDF
A Dynamic Knowledge Base Updating Mechanism-Based Retrieval-Augmented Generation Framework for Intelligent Question-and-Answer Systems
17
作者 Yu Li 《Journal of Computer and Communications》 2025年第1期41-58,共18页
In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilizati... In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries. 展开更多
关键词 Retrieval-Augmented Generation Question-and-Answer Large Language Models Dynamic Knowledge base Updating Mechanism Weighted Context-Aware Similarity
在线阅读 下载PDF
Enhanced magnetic properties in a Fe-based amorphous alloy via ultrasonic vibration rapid processing 被引量:1
18
作者 Hong-Zhen Li Sajad Sohrabi +4 位作者 Xin Li Lu-Yao Li Jiang Ma Huan-Lin Peng Chao Yang 《Rare Metals》 2025年第4期2853-2860,共8页
In general,the rapid growth of α-Fe clusters is a challenge in high Fe-content Fe-based amorphous alloys,negatively affecting their physical properties.Herein,we introduce an efficient and rapid post-treatment techni... In general,the rapid growth of α-Fe clusters is a challenge in high Fe-content Fe-based amorphous alloys,negatively affecting their physical properties.Herein,we introduce an efficient and rapid post-treatment technique known as ultrasonic vibration rapid processing(UVRP),which enables the formation of high-density strong magnetic α-Fe clusters,thereby enhancing the soft magnetic properties of Fe_(78)Si(13)B_(9) amorphous alloy ribbon. 展开更多
关键词 enhancing soft magnetic properties soft magnetic properties physical propertieshereinwe Fe based amorphous alloy amorphous alloy ribbon ultrasonic vibration rapid processing uvrp which Fe clusters ultrasonic vibration rapid processing
原文传递
ERBM:A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments
19
作者 Arshad Mehmmod Komal Batool +3 位作者 Ahthsham Sajid Muhammad Mansoor Alam Mazliham MohD Su’ud Inam Ullah Khan 《Computers, Materials & Continua》 2025年第6期5155-5179,共25页
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in... Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known threats.Nevertheless,as dynamic network traffic and a new degree of threats exist in IoT environments,these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy.In this study,we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model(ERBM)to classify the packets better and identify intrusions.The ERBM developed for this approach improves data preprocessing and feature selections by utilizing fuzzy logic,where three membership functions are created to classify all the network traffic features as low,medium,or high to remain situationally aware of the environment.Such fuzzy logic sets produce adaptive detection rules by reducing data uncertainty.Also,for further classification,machine learning classifiers such as Decision Tree(DT),Random Forest(RF),and Neural Networks(NN)learn complex ways of attacks and make the detection process more precise.A thorough performance evaluation using different metrics,including accuracy,precision,recall,F1 Score,detection rate,and false-positive rate,verifies the supremacy of ERBM over classical IDS.Under extensive experiments,the ERBM enables a remarkable detection rate of 99%with considerably fewer false positives than the conventional models.Integrating the ability for uncertain reasoning with fuzzy logic and an adaptable component via machine learning solutions,the ERBM systemprovides a unique,scalable,data-driven approach to IoT intrusion detection.This research presents a major enhancement initiative in the context of rule-based IDS,introducing improvements in accuracy to evolving IoT threats. 展开更多
关键词 Rule based INTRUSIONS IOT fuzzy prediction
在线阅读 下载PDF
Gender-based economic violence and the exploitation of women:A deep dive
20
作者 Elif Sarac Deniz Odabas 《World Journal of Psychiatry》 2025年第3期58-65,共8页
Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of g... Economic violence is a form of domestic violence that extends beyond physical harm,affecting victims’economic stability and independence.This situation perpetuates gender inequality and also reinforces the cycle of gender-based violence.With definitions of economic violence broadening to encompass a range of coercive and manipulative behaviors-from financial abuse in domestic violence scenarios to the economic harassment faced by stay-at-home moms-understanding this form of exploitation is crucial for crafting effective interventions.This article aims to delve into various facets of economic violence,including its definition,prevalence,and the stark realities it creates for its victims.Following the search of international databases:Social Work Abstracts(EBSCO),Psychology Abstracts,Family and Women Studies Worldwide,Psychiatry Online,Psych INFO(including Psych ARTICLES),PubMed,Wiley,and Scopus,60 peer-reviewed articles that met all inclusion criteria were included in the paper.Our review clarifies that looking forward,the call for a comprehensive understanding of economic violence,enhanced legal frameworks,and the strengthening of supportive networks underscore the multidisciplinary approach required to combat this issue effectively. 展开更多
关键词 Gender based Domestic violence Economic violence EXPLOITATION WOMEN
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部