期刊文献+
共找到828,924篇文章
< 1 2 250 >
每页显示 20 50 100
Research progress in methods of acquisition,structure elucidation,and quality control of Chinese herbal polysaccharides 被引量:1
1
作者 Tingting Wang Baojie Zhu +1 位作者 Jing Zhao Shaoping Li 《Chinese Journal of Natural Medicines》 2025年第2期143-157,共15页
The therapeutic efficacy of traditional Chinese medicine has been widely acknowledged due to its extensive history of clinical effectiveness.However,the precise active components underlying each prescription remain in... The therapeutic efficacy of traditional Chinese medicine has been widely acknowledged due to its extensive history of clinical effectiveness.However,the precise active components underlying each prescription remain incompletely understood.Polysaccharides,as a major constituent of water decoctions—the most common preparation method for Chinese medicinals—may provide a crucial avenue for deepening our understanding of the efficacy principles of Chinese medicine and establishing a framework for its modern development.The structural complexity and diversity of Chinese herbal polysaccharides present significant challenges in their separation and analysis compared to small molecules.This paper aims to explore the potential of Chinese herbal polysaccharides efficiently by briefly summarizing recent advancements in polysaccharide chemical research,focusing on methods of acquisition,structure elucidation,and quality control. 展开更多
关键词 Chinese medicine POLYSAccHARIDE Extraction and purification Structural analysis Quality control
原文传递
基于HACCP理论的临床试验质量控制体系探索
2
作者 钱春艳 李洁 +2 位作者 杨能 方莉 程海霞 《中国药业》 2026年第2期45-49,共5页
目的进一步优化临床试验质量控制体系。方法基于危害分析与关键控制点(HACCP)理论建立小组,经讨论初步确定质量管理体系的关键点并采用Delphi法进行2轮探讨,明确HACCP的范围、目标和进度。小组讨论总结出临床试验质量管理的6个流程,经... 目的进一步优化临床试验质量控制体系。方法基于危害分析与关键控制点(HACCP)理论建立小组,经讨论初步确定质量管理体系的关键点并采用Delphi法进行2轮探讨,明确HACCP的范围、目标和进度。小组讨论总结出临床试验质量管理的6个流程,经危害分析(HA)确定临床试验管理流程中的关键控制点(CCP),探索临床试验的闭环式管理路径。结果找到了临床试验管理流程中的9项CCP,并针对性建立事前预防、事中监测、事后干预的机制,通过对CCP的监控要求、纠正措施及验证程序的制订,实现临床试验的闭环式管理。结论该研究中建立了以预防为主的临床试验质量控制体系,一定程度上预防并减少了临床试验质量控制事件的发生,对于提升临床试验的质量及标准化有重要意义。 展开更多
关键词 临床试验 质量控制 危害分析与关键控制点 药事管理
暂未订购
A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems
3
作者 Jiyu Zhang Kehe Wu +4 位作者 Ruomeng Yan Zheng Tian Yizhen Sun Yuxi Wu Yaogong Guo 《Computers, Materials & Continua》 SCIE EI 2025年第1期1211-1232,共22页
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig... Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions. 展开更多
关键词 Access control renewable energy systems(RES) ciphertext-policy attribute-based encryption(CP-ABE) security
在线阅读 下载PDF
High-Temperature Stable Dispersed Particle Gel for Enhanced Profile Control in Carbon Capture,Utilization,and Storage(CCUS)Applications 被引量:1
4
作者 Lin Du Yao-Yu Xiao +2 位作者 Zhi-Chao Jiang Hongbo Zeng Huazhou Li 《Engineering》 2025年第5期128-140,共13页
CO_(2)-responsive gels,which swell upon contact with CO_(2),are widely used for profile control to plug high-permeability gas flow channels in carbon capture,utilization,and storage(CCUS)applications in oil reser-voir... CO_(2)-responsive gels,which swell upon contact with CO_(2),are widely used for profile control to plug high-permeability gas flow channels in carbon capture,utilization,and storage(CCUS)applications in oil reser-voirs.However,the use of these gels in high-temperature CCUS applications is limited due to their rever-sible swelling behavior at elevated temperatures.In this study,a novel dispersed particle gel(DPG)suspension is developed for high-temperature profile control in CCUS applications.First,we synthesize a double-network hydrogel consisting of a crosslinked polyacrylamide(PAAm)network and a crosslinked sodium alginate(SA)network.The hydrogel is then sheared in water to form a pre-prepared DPG suspen-sion.To enhance its performance,the gel particles are modified by introducing potassium methylsilan-etriolate(PMS)upon CO_(2) exposure.Comparing the particle size distributions of the modified and pre-prepared DPG suspension reveals a significant swelling of gel particles,over twice their original size.Moreover,subjecting the new DPG suspension to a 100℃ environment for 24 h demonstrates that its gel particle sizes do not decrease,confirming irreversible swelling,which is a significant advantage over the traditional CO_(2)-responsive gels.Thermogravimetric analysis further indicates improved thermal sta-bility compared to the pre-prepared DPG particles.Core flooding experiments show that the new DPG suspension achieves a high plugging efficiency of 95.3%in plugging an ultra-high permeability sandpack,whereas the pre-prepared DPG suspension achieves only 82.8%.With its high swelling ratio,irreversible swelling at high temperatures,enhanced thermal stability,and superior plugging performance,the newly developed DPG suspension in this work presents a highly promising solution for profile control in high-temperature CCUS applications. 展开更多
关键词 Carbon capture utilization and storage Profile control Dispersed particle gel Double-network hydrogel Irreversible swelling
在线阅读 下载PDF
Reporting quality of randomized controlled trials on acupuncture and manipulation for greater occipital neuralgia evaluated using the CONSORT statement and STRICTA checklist
5
作者 Liu Liguo Qiu Mingwang +3 位作者 Huang Yanling Fan Zhiyong Wu Shan Guo Rusong 《中国组织工程研究》 北大核心 2025年第30期6566-6573,共8页
OBJECTIVE:In recent years,the number of clinical research reports on acupuncture and manipulation for the treatment of greater occipital neuralgia has gradually increased,but the quality is uneven.There is currently n... OBJECTIVE:In recent years,the number of clinical research reports on acupuncture and manipulation for the treatment of greater occipital neuralgia has gradually increased,but the quality is uneven.There is currently no literature evaluating the quality of published reports,which is not conducive to the promotion of clinical use of these therapies.Therefore,this article assessed the reporting quality of randomized controlled trials on acupuncture and manipulation for greater occipital neuralgia.METHODS:Cochrane Library,PubMed,Web of Science,Embase,China National Knowledge Infrastructure(CNKI),VIP,WanFang Data,and Chinese BioMedical Literature Database(CBM)from inception to May 20,2024 were searched.The reporting quality of included randomized controlled trials was independently evaluated by two investigators using the CONSORT statement,STRICTA checklist,and Cochrane bias of risk assessment tool.A third investigator resolved any disagreement.RESULTS:A total of 62 articles were included.Based on the CONSORT statement,59.46%(22/37)of all entries had a reporting rate of less than 50%,mainly including“Identification as a randomized trial in the title(1/62,1.61%),”“How sample size was determined(7/62,11.29%),”“Implementation(1/62,1.61%),”“Blinding(1/62,1.61%),”and“Reports of Funding(4/62,6.45%).”According to the STRICTA checklist,29.41%(5/17)of all entries had a reporting rate of less than 50%,mainly including“Details of other interventions(7/58,12.07%),”“Setting and context of treatment(0/58,0%),”and“Description of participating acupuncturists(0/58,0%).”CONCLUSION:The reporting quality of randomized controlled trials on acupuncture and manipulation therapy for greater occipital neuralgia remains low.Future researchers need to make greater efforts to strictly adhere to the CONSORT statement and STRICTA checklist during trial design,implementation,and reporting.This will facilitate the standardization of research in this field and enhance the reliability and reproducibility of the research results. 展开更多
关键词 reporting quality ACUPUNCTURE MANIPULATION CONSORT statement STRICTA checklist ROB clinical randomized controlled trials greater occipital neuralgia
暂未订购
Application of Fructo-oligosaccharides Quality Control Chart in Milk Powder
6
作者 Guoxia DUAN Lijun LIU +5 位作者 Ruilong XIE Xue HU Lunwei WU Jing CHEN Huili GONG Chunxia LIU 《Asian Agricultural Research》 2025年第1期35-37,共3页
The quality control chart of fructo-oligosaccharides in milk powder was established to determine whether the detection process and results are in control state.The content of fructo-oligosaccharides in milk powder con... The quality control chart of fructo-oligosaccharides in milk powder was established to determine whether the detection process and results are in control state.The content of fructo-oligosaccharides in milk powder control samples was determined by ion chromatography,and the quality control chart of fructo-oligosaccharides was established to analyze the controlled state.The results indicate that the median of the quality control chart is 1613.14 mg/100 g,and the standard deviation is 85.57 mg/100 g.The new quality control points were evaluated and analyzed,and the precision changed,but the mean value did not change.Further F test was conducted to determine that the precision did not change significantly,indicating that the test was in a statistical control state,and the detection process,method and results were controlled. 展开更多
关键词 Quality control chart FRUCTO-OLIGOSAccHARIDES Milk powder
在线阅读 下载PDF
Research on the Application of Single-Chip Microcomputer in Wind Turbine Control
7
作者 Wei Ju 《Journal of Electronic Research and Application》 2025年第4期24-29,共6页
As an important source of clean and renewable resources,the importance of wind power generation is increasing under the background of the theme of“environmental protection”in the new era.The efficiency of wind power... As an important source of clean and renewable resources,the importance of wind power generation is increasing under the background of the theme of“environmental protection”in the new era.The efficiency of wind power generation is mainly affected by the reliability and performance of the power generation system,so it is necessary to use a single-chip microcomputer system and an intelligent algorithm to assist control,so as to improve the performance of wind power generation.Based on this research background,this paper expounds the working principle and basic characteristics of a single-chip microcomputer,summarizes its application advantages in wind turbine control,and puts forward the application practice strategy of a single-chip microcomputer in a wind turbine control system,which provides important assistance for the upgrading of the wind power system. 展开更多
关键词 MICROcontrolLER Wind power generation Generator control
在线阅读 下载PDF
Efficient Control of Mechatronic Systems Enabled by Generative AI for Single-Chip Microcomputers
8
作者 Hang Xu Yao Mai 《Journal of Electronic Research and Application》 2025年第6期35-40,共6页
In recent years,research on industrial innovation and development has primarily focused on industrial automation and intelligent manufacturing.Within the field of integrating mechatronics and intelligent control,analy... In recent years,research on industrial innovation and development has primarily focused on industrial automation and intelligent manufacturing.Within the field of integrating mechatronics and intelligent control,analyzing the efficient control of mechatronic systems enabled by generative AI for single-chip microcomputers can further highlight the value and significance of promoting AI technology applications.This paper examines the technical characteristics of generative AI in data generation,multimodal fusion,and dynamic adaptation,proposing lightweight model deployment strategies that compress large generative models to a range compatible with single-chip microcomputers,ensuring local real-time inference capabilities.It constructs an edge intelligent control architecture,enabling generative AI to directly participate in decision-making instruction generation,forming a new working system of perception,decision-making,and execution.Additionally,it designs a collaborative optimization training mechanism that leverages federated learning to overcome single-machine data limitations and enhance model generalization performance.At the application level,an intelligent fault prediction system is developed for early identification of equipment anomalies,an adaptive parameter optimization module is constructed for dynamically adjusting control strategies,and a multi-device collaborative scheduling engine is established to optimize production processes,providing technical support for embedded intelligent control in Industry 4.0 scenarios. 展开更多
关键词 Generative AI Single-chip microcomputer Mechatronic system Efficient control
在线阅读 下载PDF
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
9
作者 Qi Li Gaozhan Liu +4 位作者 Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong 《Digital Communications and Networks》 2025年第2期473-481,共9页
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem... Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption. 展开更多
关键词 Access control Policy hiding Verifiable outsourced computation CLOUD IOT
在线阅读 下载PDF
CC-OLIA:A dynamic congestion control algorithm for multipath QUIC in mobile networks
10
作者 Haoyu Wang Yang Liu +5 位作者 Zijun Li Yu Zhang Wenjing Gong Tao Jiang Ting Bi Jiaxi Zhou 《Digital Communications and Networks》 2025年第4期1180-1190,共11页
High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support s... High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support stable and efficient transmission.The standard coupled congestion control algorithm in MPQUIC synchronizes these paths to manage congestion,meeting fairness requirements and improving transmission efficiency.However,current algorithms’Congestion Window(CWND)reduction approach significantly decreases CWND upon packet loss,which lowers effective throughput,regardless of the congestion origin.Furthermore,the uncoupled Slow-Start(SS)in MPQUIC leads to independent exponential CWND growth on each path,potentially causing buffer overflow.To address these issues,we propose the CC-OLIA,which incorporates Packet Loss Classifcation(PLC)and Coupled Slow-Start(CSS).The PLC distinguishes between congestion-induced and random packet losses,adjusting CWND reduction accordingly to maintain throughput.Concurrently,the CSS module coordinates CWND growth during the SS,preventing abrupt increases.Implementation on MININET shows that CC-OLIA not only maintains fair performance but also enhances transmission efficiency across diverse network conditions. 展开更多
关键词 MPQUIC Mobile network Congestion control Packet loss Slow start
在线阅读 下载PDF
Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network
11
作者 Aodi Liu Xuehui Du +1 位作者 Na Wang Xiangyu Wu 《Computers, Materials & Continua》 2025年第4期1495-1513,共19页
Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribut... Security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)mechanisms.However,when dealing with massive volumes of unstructured text big data resources,the current attribute management methods based on manual extraction face several issues,such as high costs for attribute extraction,long processing times,unstable accuracy,and poor scalability.To address these problems,this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks.This technology leverages transfer learning ideas,utilizing Bidirectional Encoder Representations from Transformers(BERT)pre-trained language models to achieve vectorization of unstructured text data resources.Furthermore,we have designed a novel end-to-end parallel hybrid network structure,where the parallel networks handle global and local information features of the text that they excel at,respectively.By employing techniques such as attention mechanisms,capsule networks,and dynamic routing,effective mining of security attributes for access control resources has been achieved.Finally,we evaluated the performance level of the proposed attribute mining method for access control institutions through experiments on the medical referral text resource dataset.The experimental results show that,compared with baseline algorithms,our method adopts a parallel network structure that can better balance global and local feature information,resulting in improved overall performance.Specifically,it achieves a comprehensive performance enhancement of 2.06%to 8.18%in the F1 score metric.Therefore,this technology can effectively provide attribute support for access control of unstructured text big data resources. 展开更多
关键词 Access control ABAC model attribute mining capsule network deep learning
在线阅读 下载PDF
An Improved Chicken Swarm Optimization Techniques Based on Cultural Algorithm Operators for Biometric Access Control
12
作者 Jonathan Ponmile Oguntoye Sunday Adeola Ajagbe +4 位作者 Oluyinka Titilayo Adedeji Olufemi Olayanju Awodoye Abigail Bola Adetunji Elijah Olusayo Omidiora Matthew Olusegun Adigun 《Computers, Materials & Continua》 2025年第9期5713-5732,共20页
This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization(CCSO)technique.This approach mitigates the limitations of conventional Chicken Swarm Optimization(CS... This study proposes a system for biometric access control utilising the improved Cultural Chicken Swarm Optimization(CCSO)technique.This approach mitigates the limitations of conventional Chicken Swarm Optimization(CSO),especially in dealing with larger dimensions due to diversity loss during solution space exploration.Our experimentation involved 600 sample images encompassing facial,iris,and fingerprint data,collected from 200 students at Ladoke Akintola University of Technology(LAUTECH),Ogbomoso.The results demonstrate the remarkable effectiveness of CCSO,yielding accuracy rates of 90.42%,91.67%,and 91.25%within 54.77,27.35,and 113.92 s for facial,fingerprint,and iris biometrics,respectively.These outcomes significantly outperform those achieved by the conventional CSO technique,which produced accuracy rates of 82.92%,86.25%,and 84.58%at 92.57,63.96,and 163.94 s for the same biometric modalities.The study’s findings reveal that CCSO,through its integration of Cultural Algorithm(CA)Operators into CSO,not only enhances algorithm performance,exhibiting computational efficiency and superior accuracy,but also carries broader implications beyond biometric systems.This innovation offers practical benefits in terms of security enhancement,operational efficiency,and adaptability across diverse user populations,shaping more effective and resource-efficient access control systems with real-world applicability. 展开更多
关键词 Access control biometric technology chicken swarm optimization cultural algorithm pattern recognition
在线阅读 下载PDF
Effectiveness of subcutaneous tunneling technique in reducing PICC dislodgement and malposition:a pilot multicenter randomized controlled trial
13
作者 Yuan Sheng Wei Gao Sheng-Yi Dongye 《Frontiers of Nursing》 2025年第1期145-153,共9页
Objective:To evaluate the impact of subcutaneous tunneling on peripherally inserted central catheters(PICCs)dislodgement and malposition.Dislodged or malpositioned PICCs can lead to improper treatment.The subcutaneous... Objective:To evaluate the impact of subcutaneous tunneling on peripherally inserted central catheters(PICCs)dislodgement and malposition.Dislodged or malpositioned PICCs can lead to improper treatment.The subcutaneous tunneling strategy may be effective,but there is insufficient evidence,and proximal movement has not been explored.Methods:We randomized 630 patients who needed PICCs placement to either the tunneled PICCs(experimental group)or the non-tunneled PICCs(control group).Dislodgement and malposition of the catheter were the primary outcomes,and catheter-related infection(CRI)and catheter-related thrombosis(CRT)were the secondary outcomes.Results:Subcutaneous tunneling does not significantly reduce distal catheter movement,but it significantly reduces proximal catheter movement(4.3%vs.9.9%,P=0.007),which may explain the lower incidence of CRI(2.0%vs.5.3%,P=0.030)and CRT(3.6%vs.12.5%,P<0.001).Conclusions:Although subcutaneous tunneling does not significantly improve catheter prolapse,it should still be used clinically because proximal catheter movement can be a more serious problem associated with CRI and CRT. 展开更多
关键词 CATHETERIZATION COMPLICATIONS peripheral adverse effects randomized controlled trial tunneled multicenter study
暂未订购
Key Technologies for Security Control of 5G-R Terminal and Application Access
14
作者 MA Jun LIU Chang +2 位作者 LIN Wei LI Hui HAN Xu(Translated) 《Chinese Railways》 2025年第1期3-10,共8页
Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the applicatio... Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the application scenarios,operational modes,services supported by 5G-R terminals,and the data paths between these terminals and the connected railway application service systems.Further analysis concentrates on the security risks posed by the characteristics of intelligent 5G-R handheld terminals,lightweight Internet of Things(IoT)communication terminals,and onboard integrated wireless transmission equipment with public-private convergence.In light of the risks above,this paper presents the terminal security control requirements.Furthermore,based on the planned architecture of the 5G-R system and security technologies such as terminal identity authentication and behavior auditing,the paper proposes a solution package for the 5G-R terminal security control system,including the overall architecture,functional implementation,and interface configuration.These solutions aim to achieve unified control over the admission and access of 5G-R handheld terminals,IoT communication terminals,and onboard integrated wireless communication equipment to railway application systems.Additionally,they enable the security control and analysis of terminal behaviors and application data,facilitate the security management of terminals,and ensure the secure release,download,and installation of mobile applications. 展开更多
关键词 5G-R 5G-R terminal application access security control communication interface
原文传递
Extinction and Optimal Control of Stochastic Epidemic Model with Multiple Vaccinations and Time Delay
15
作者 YANG Rujie QIU Hong JU Xuewei 《数学理论与应用》 2025年第2期110-121,共12页
In this paper,based on the SVIQR model we develop a stochastic epidemic model with multiple vaccinations and time delay.Firstly,we prove the existence and uniqueness of the global positive solution of the model,and co... In this paper,based on the SVIQR model we develop a stochastic epidemic model with multiple vaccinations and time delay.Firstly,we prove the existence and uniqueness of the global positive solution of the model,and construct suitable functions to obtain sufficient conditions for disease extinction.Secondly,in order to effectively control the spread of the disease,appropriate control strategies are formulated by using optimal control theory.Finally,the results are verified by numerical simulation. 展开更多
关键词 Stochastic epidemic model Multiple vaccinations Extinction of disease Isolation delay Optimal control
在线阅读 下载PDF
DRG-DCC:A Driving Risk Gaming Based Distributed Congestion Control Method for C-V2X Technology
16
作者 Lingqiu Zeng Peibing Sa +4 位作者 Qingwen Han Lei Ye Letian Yang Cheng Zhang Jiqiang Cheng 《Computers, Materials & Continua》 2025年第5期2059-2086,共28页
Congestion control is an inherent challenge of V2X(Vehicle to Everything)technologies.Due to the use of a broadcasting mechanism,channel congestion becomes severe with the increase in vehicle density.The researchers s... Congestion control is an inherent challenge of V2X(Vehicle to Everything)technologies.Due to the use of a broadcasting mechanism,channel congestion becomes severe with the increase in vehicle density.The researchers suggested reducing the frequency of packet dissemination to relieve congestion,which caused a rise in road driving risk.Obviously,high-risk vehicles should be able to send messages timely to alarm surrounding vehicles.Therefore,packet dissemination frequency should be set according to the corresponding vehicle’s risk level,which is hard to evaluate.In this paper,a two-stage fuzzy inference model is constructed to evaluate a vehicle’s risk level,while a congestion control algorithm DRG-DCC(Driving Risk Game-Distributed Congestion Control)is proposed.Moreover,HPSO is employed to find optimal solutions.The simulation results show that the proposed method adjusts the transmission frequency based on driving risk,effectively striking a balance between transmission delay and channel busy rate. 展开更多
关键词 Distributed congestion control fuzzy inference driving risk evaluation game theory Nash equilibrium
在线阅读 下载PDF
Effects of Internet-Based Acceptance and Commitment Therapy on College Students’Mental Health: A Randomized Controlled Trial
17
作者 Jing Wang Shuanghu Fang +1 位作者 Zihua Li Shaoyong Ma 《International Journal of Mental Health Promotion》 2025年第6期845-861,共17页
Objectives:College students face increasing mental health challenges.Although Acceptance and CommitmentTherapy(ACT)is effective,the efficacy of Internet-based ACT(iACT)needs further exploration.Methods:This study exam... Objectives:College students face increasing mental health challenges.Although Acceptance and CommitmentTherapy(ACT)is effective,the efficacy of Internet-based ACT(iACT)needs further exploration.Methods:This study examines the efficacy of iACT on college students’mental health through a randomized controlled trial.We recruited 90 college students(19.16±1.02 years old)and randomly divided them into the iACT group,face-to-face ACT group,and control group.The effects of the interventions were evaluated using the comprehensive assessment of ACT processes(CompACT)and the Depression Anxiety Stress Scales(DASS-21).Results:Two-factor repeated measures ANOVA revealed a significant time main effect of iACT.Face-to-face ACT and iACT effectively improved college students’psychological flexibility[F(2,83)=18.78,p<0.001,η^(2)=0.18]and alleviated their negative emotions[F(2,82)=41.17,p<0.001,η^(2)=0.36].Face-to-face ACT exhibited sustained effects on improving participants’psychological flexibility and alleviating their negative emotions(p<0.001),while iACT showed no sustained effect on improving participants’psychological flexibility(p>0.05).Conclusion:While iACT and face-to-face ACT are effective shortterm interventions,face-to-face ACT demonstrates superior sustainability.Integrating guided sessions into iACT may enhance long-term outcomes.These findings advocate for blended interventions to address college students’mental health needs,particularly in resource-limited settings. 展开更多
关键词 Internet-based acceptance and commitment therapy mental health college students randomized controlled trial
在线阅读 下载PDF
Global integration design method of acceleration and deceleration control schedule for variable cycle engine
18
作者 Ying CHEN Sangwei LU +1 位作者 Wenxiang ZHOU Jinquan HUANG 《Chinese Journal of Aeronautics》 2025年第5期248-261,共14页
Variable Cycle Engine(VCE)serves as the core system in achieving future advanced fighters with cross-generational performance and mission versatility.However,the resultant complex configuration and strong coupling of ... Variable Cycle Engine(VCE)serves as the core system in achieving future advanced fighters with cross-generational performance and mission versatility.However,the resultant complex configuration and strong coupling of control parameters present significant challenges in designing acceleration and deceleration control schedules.To thoroughly explore the performance potential of engine,a global integration design method for acceleration and deceleration control schedule based on inner and outer loop optimization is proposed.The outer loop optimization module employs Integrated Surrogate-Assisted Co-Differential Evolutionary(ISACDE)algorithm to optimize the variable geometry adjustment laws based on B-spline curve,and the inner loop optimization module adopts the fixed-state method to design the open-loop fuel–air ratio control schedules,which are aimed at minimizing the acceleration and deceleration time under multiple constraints.Simulation results demonstrate that the proposed global integration design method not only furthest shortens the acceleration and deceleration time,but also effectively safeguards the engine from overlimit. 展开更多
关键词 control schedule design Acceleration and deceleration Variablecycle engine Fixed-states method Co-differential evolutionary algorithm
原文传递
Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control
19
作者 Ammar Odeh Anas Abu Taleb 《Computers, Materials & Continua》 2025年第7期447-461,共15页
The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms r... The increasing deployment of Internet of Things(IoT)devices has introduced significant security chal-lenges,including identity spoofing,unauthorized access,and data integrity breaches.Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure,scalability issues,and inefficiencies in real-time security enforcement.To address these limitations,this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security(BETAC-IoT)model,which integrates blockchain technology,smart contracts,federated learning,and Merkle tree-based integrity verification to enhance IoT security.The proposed model eliminates reliance on centralized authentication by employing decentralized identity management,ensuring tamper-proof data storage,and automating access control through smart contracts.Experimental evaluation using a synthetic IoT dataset shows that the BETAC-IoT model improves access control enforcement accuracy by 92%,reduces device authentication time by 52%(from 2.5 to 1.2 s),and enhances threat detection efficiency by 7%(from 85%to 92%)using federated learning.Additionally,the hybrid blockchain architecture achieves a 300%increase in transaction throughput when comparing private blockchain performance(1200 TPS)to public chains(300 TPS).Access control enforcement accuracy was quantified through confusion matrix analysis,with high precision and minimal false positives observed across access decision categories.Although the model presents advantages in security and scalability,challenges such as computational overhead,blockchain storage constraints,and interoperability with existing IoT systems remain areas for future research.This study contributes to advancing decentralized security frameworks for IoT,providing a resilient and scalable solution for securing connected environments. 展开更多
关键词 Blockchain IoT security access control federated learning merkle tree decentralized identity manage-ment threat detection
在线阅读 下载PDF
溃疡性结肠炎患者血清PRDX1、CCL-25水平及其与病情严重程度、临床转归的关系
20
作者 周鑫 周丽峰 +2 位作者 杜行极 范军 杨惟明 《检验医学与临床》 2026年第1期32-37,共6页
目的探讨溃疡性结肠炎(UC)患者血清过氧化物还原酶1(PRDX1)、CC基序趋化因子配体-25(CCL-25)水平及其与病情严重程度、临床转归的关系。方法选取2021年3月至2024年6月克孜勒苏柯尔克孜自治州人民医院收治的218例UC患者作为UC组,根据病... 目的探讨溃疡性结肠炎(UC)患者血清过氧化物还原酶1(PRDX1)、CC基序趋化因子配体-25(CCL-25)水平及其与病情严重程度、临床转归的关系。方法选取2021年3月至2024年6月克孜勒苏柯尔克孜自治州人民医院收治的218例UC患者作为UC组,根据病情严重程度分度分为轻度组、中度组和重度组,根据6个月临床转归分为转归不良组和转归良好组。另选取同期在克孜勒苏柯尔克孜自治州人民医院体检的109例健康体检者作为对照组。采用酶联免疫吸附试验检测所有研究对象血清PRDX1、CCL-25水平。采用多因素Logistic回归分析UC患者临床转归不良的影响因素。绘制受试者工作特征(ROC)曲线分析血清PRDX1、CCL-25对UC患者临床转归不良的预测价值。结果UC组血清PRDX1、CCL-25水平均高于对照组,差异均有统计学意义(P<0.05)。中度组和重度组血清PRDX1、CCL-25水平均高于轻度组,重度组血清PRDX1、CCL-25水平均高于中度组,差异均有统计学意义(P<0.05)。转归不良组病程长于转归良好组,重度患者占比,以及血清PRDX1、CCL-25水平均高于转归良好组,差异均有统计学意义(P<0.05)。多因素Logistic回归分析结果显示,病情严重程度为重度及血清PRDX1、CCL-25水平升高均为UC患者临床转归不良的独立危险因素(P<0.05)。ROC曲线分析结果显示,血清PRDX1、CCL-25联合预测UC患者临床转归不良的曲线下面积(AUC)为0.888,大于二者单独预测的AUC(0.782、0.794),差异均有统计学意义(Z=4.316、3.814,P<0.001)。结论UC患者血清PRDX1、CCL-25水平均升高,与病情严重程度加重及临床转归不良均密切相关。血清PRDX1、CCL-25联合对UC患者临床转归不良的预测价值较高。 展开更多
关键词 溃疡性结肠炎 过氧化物还原酶1 cc基序趋化因子配体-25 病情严重程度 临床转归
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部