期刊文献+
共找到421篇文章
< 1 2 22 >
每页显示 20 50 100
Experimentation with Personal Identifiable Information 被引量:3
1
作者 Sabah Al-Fedaghi Abdul Aziz Rashid Al-Azmi 《Intelligent Information Management》 2012年第4期123-133,共11页
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua... In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others. 展开更多
关键词 PERSONAL identifiable INFORMATION PUBLIC POLICY Issues PRIVACY Sensitivity
暂未订购
TPII:tracking personally identifiable information via user behaviors in HTTP traffic 被引量:1
2
作者 Yi LIU Tian SONG Lejian LIAO 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期175-187,共13页
It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide preci... It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide precise and recommending services.Meanwhile,Internet service providers(ISPs)or local network providers also have strong requirements to collect PIIs for finer-grained traffic control and security services.However,it is a challenge to locate PIIs accurately in the massive data of network traffic just like looking a needle in a haystack.In this paper,we address this challenge by presenting an efficient and light-weight approach,namely TPII,which can locate and track PIIs from the HTTP layer rebuilt from raw network traffics.This approach only collects three features from HTTP fields as users'behaviors and then establishes a tree-based decision model to dig PIIs efficiently and accurately.Without any priori knowledge,TPII can identify any types of PIIs from any mobile applications,which has a broad vision of applications.We evaluate the proposed approach on a real dataset collected from a campus network with more than 13k users.The experimental results show that the precision and recall of TPII are 91.72%and 94.51%respectively and a parallel implementation of TPII can achieve 213 million records digging and labelling within one hour,reaching near to support 1Gbps wirespeed inspection in practice.Our approach provides network service providers a practical way to collect PIIs for better services. 展开更多
关键词 network traffic analysis personally identifiable information privacy leakage mobile applications HTTP
原文传递
Fully distributed identity-based threshold signatures with identifiable aborts 被引量:1
3
作者 Yan JIANG Youwen ZHU +1 位作者 Jian WANG Xingxin LI 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期179-195,共17页
Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel... Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Nevertheless,most IDTS schemes rely on a trusted key generation center(KGC).Recently,some IDTS schemes can achieve escrow-free security against corrupted KGC,but all of them are vulnerable to denial-of-service attacks in the dishonest majority setting,where cheaters may force the protocol to abort without providing any feedback.In this work,we present a fully decentralized IDTS scheme to resist corrupted KGC and denialof-service attacks.To this end,we design threshold protocols to achieve distributed key generation,private key extraction,and signing generation which can withstand the collusion between KGCs and signers,and then we propose an identification mechanism that can detect the identity of cheaters during key generation,private key extraction and signing generation.Finally,we formally prove that the proposed scheme is threshold unforgeability against chosen message attacks.The experimental results show that the computation time of both key generation and signing generation is<1 s,and private key extraction is about 3 s,which is practical in the distributed environment. 展开更多
关键词 threshold signatures single points of failure identifiable aborts
原文传递
Rainbow:reliable personally identifiable information retrieval across multi-cloud
4
作者 Zishuai Song Hui Ma +2 位作者 Shuzhou Sun Yansen Xin Rui Zhang 《Cybersecurity》 EI CSCD 2023年第4期88-108,共21页
Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Buildin... Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Building a PII retrieval service over multi-cloud,which is a modern strategy to make services stable where multiple servers are deployed,seems to be a promising solution.However,three major technical challenges remain to be solved.The first is the privacy and access control of PII.In fact,each entry in PII can be shared to different users with different access rights.Hence,flexible and fine-grained access control is needed.Second,a reliable user revocation mechanism is required to ensure that users can be revoked efficiently,even if few cloud servers are compromised or collapse,to avoid data leakage.Third,verifying the correctness of received PII and locating a misbehaved server when wrong data are returned is crucial to guarantee user’s privacy,but challenging to realize.In this paper,we propose Rainbow,a secure and practical PII retrieval scheme to solve the above issues.In particular,we design an important cryptographic tool,called Reliable Outsourced Attribute Based Encryption(ROABE)which provides data privacy,flexible and fine-grained access control,reliable immediate user revocation and verification for multiple servers simultaneously,to support Rainbow.Moreover,we present how to build Rainbow with ROABE and several necessary cloud techniques in real world.To evaluate the performance,we deploy Rainbow on multiple mainstream clouds,namely,AWS,GCP and Microsoft Azure,and experiment in browsers on mobile phones and computers.Both theoretical analysis and experimental results indicate that Rainbow is secure and practical. 展开更多
关键词 Personally identifiable information Data privacy Flexible access control Reliable user revocation Verification
原文传递
Proteomic Analysis Revealing Protein Expression in Rice Grain Containing Differential Protein and Amino Acid Contents
5
作者 Krishnendu CHATTOPADHYAY Arabinda MAHANTY +6 位作者 Nutan MOHARANA Shuvendu Shekhar MOHAPATRA Torit Baran BAGCHI Koushik CHAKRABORTY Joydeep BANERJEE Bimal Prasanna MOHANTY Trilochan MOHAPATRA 《Rice science》 2026年第1期9-14,I0012-I0027,共22页
CR Dhan 310(CRD310),a biofortified rice variety,contains a significantly higher level of grain protein compared with its recurrent parent Naveen(NV),as well as most adapted high-yielding rice varieties in India.Althou... CR Dhan 310(CRD310),a biofortified rice variety,contains a significantly higher level of grain protein compared with its recurrent parent Naveen(NV),as well as most adapted high-yielding rice varieties in India.Although a limited investigation depicted that CRD310 contained higher levels of glutelin and some essential amino acids,detailed biochemical,molecular,and cellular mechanisms remain to be studied.As one of the means to identify the proteins and understand the underlying mechanism of higher proteins accumulation in grains of CRD310,the comparative proteomics was undertaken on grains of CRD310 and NV at the yellow ripening stage. 展开更多
关键词 grain protein rice grain comparative proteomics essential amino acids identify proteins protein accumulation biochemical mechanisms amino acidsdetailed
在线阅读 下载PDF
QTL-Seq Identifies Genomic Regions Associated with Resistance to Bipolaris oryzae and Their Association with Defense Related Enzyme Activity in Rice
6
作者 Jagjeet Singh LORE Sanjay KUMAR +4 位作者 Dharminder BHATIA Mandeep Singh HUNJAN Rishabh MAHESHWARI Dayananda Veeriah Patil Jyoti JAIN 《Rice science》 2026年第1期15-20,I0028-I0033,共12页
Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an ... Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes. 展开更多
关键词 bipolaris oryzae temporal spik RESISTANCE defense related enzymes bipolaris oryzaeis identify potential qtls resistant genetic sources quantitative trait loci
在线阅读 下载PDF
Geochemistry,possible origin and exploration potential of crude oils from Neogene Shawan Formation in the Chepaizi Uplift,Junggar Basin(NW China)based on biomarker recovery method
7
作者 Chen-yu Wang Xiang-chun Chang +4 位作者 You-de Xu Bing-bing Shi Tian-chen Ge Wei-zheng Gao Lei Su 《China Geology》 2026年第1期86-101,共16页
The Neogene Shawan Formation in the Chepaizi Uplift of the Junggar Basin(NW China)has obtained high oil flow,demonstrating a good potential for oil and gas exploration.The multi-source hydrocarbon generation backgroun... The Neogene Shawan Formation in the Chepaizi Uplift of the Junggar Basin(NW China)has obtained high oil flow,demonstrating a good potential for oil and gas exploration.The multi-source hydrocarbon generation background and strong tectonic activity have led to the simultaneous production of heavy oil and light oil from multi-layer in the area,which makes it very difficult to identify oil origins,presently,the hot debate on the oil origins needs to be clarified.In this paper,due to the selective consumption of different types of compounds in crude oils by severe and intense biodegradation,the commonly used oilsource correlation tools are ineffective or may produce misleading results,this study adopted a biomarker recovery method based on the principle of mass conservation that uses the sum of the mass of the residual biomarkers and their corresponding biodegradation products to obtain the mass of the original biomarkers,improving the reliability of oil origins determination.Based on the nature and occurrence of crude oils,the investigated oils are subdivided into three types,Group A,Group B and Group C.Group A,light oils occurred mainly in lower structure Neogene Shawan Formation in the western Chepaizi Uplift,while Group B,heavy oils occurred mainly in higher structure Neogene Shawan Formation in the western Chepaizi Uplift.The two types of crude oils may come from the mixed source of Jurassic Badaowan Formation source rocks(J_(1)b)and Paleogene Anjihaihe Formation source rocks(E_(2-3)a)in the Sikeshu Sag,and Jurassic Badaowan Formation source rocks(J_(1)b)are the main source of crude oils.Group C,heavy oils occurred mainly in Neogene Shawan Formation in the eastern Chepaizi Uplift,showing good correlation with the Permian(P_(1)f and P_(2)w)source rocks in the Shawan Sag.At the same time,by combining stable carbon isotope and parameters related to triaromatic steroids,the accuracy of the oilsource correlation results by biomarker recovery method was further verified. 展开更多
关键词 Biomarker recovery Oil-source correlation Stable carbon isotope Heavy and light oil identify Oil-gas exploration potential Chepaizi Uplift Neogene Shawan Formation Petroleum exploration engineering Junggar Basin
在线阅读 下载PDF
TGI-FPR: An Improved Multi-Label Password Guessing Model
8
作者 Wei Ou Shuai Liu +3 位作者 Mengxue Pang Jianqiang Ma Qiuling Yue Wenbao Han 《Computers, Materials & Continua》 2025年第7期463-490,共28页
TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password secur... TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing.Due to its remarkable guessing performance,the model has drawn considerable attention in password security research.However,through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information,we identified that the model fails to consider popular passwords and frequent substrings,and it uses overly broad personal information categories,with extensive duplicate statistics.To address these issues,we propose an improved password guessing model,TGI-FPR,which incorporates three semantic methods:(1)identification of popular passwords by generating top 300 lists from similar websites,(2)use of frequent substrings as new grammatical labels to capture finer-grained password structures,and(3)further subdivision of the six major categories of personal information.To evaluate the performance of the proposed model,we conducted experiments on six large-scale real-world password leak datasets and compared its accuracy within the first 100 guesses to that of TarGuess-I.The results indicate a 2.65%improvement in guessing accuracy. 展开更多
关键词 Password analysis personally identifiable information frequent substring password guessing model
在线阅读 下载PDF
Upholding Fundamental Principles and Breaking New Ground in Building China’s Independent Human Rights Knowledge System——A Theoretical Review of and Outlook for Human Rights Research in 2024
9
作者 WANG Liwan DI Lei CHEN Feng(Translated) 《The Journal of Human Rights》 2025年第2期462-501,共40页
In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and d... In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and discourses.Building an independent human rights knowledge system has become a core academic focus in China’s human rights research field.Upholding fundamental principles and breaking new ground are the key methodological principles for the process.China’s human rights research should be rooted in the“cultural lineage”by preserving the essence of fine traditional Chinese culture,guided by the“moral lineage”by adhering to the Marxist view on human rights,and anchored in the“Four-sphere Confidence”by upholding a distinct human rights development path,so as to define the historical coordinates and value stance of China’s independent human rights knowledge system.Meanwhile,it should maintain a high degree of openness in knowledge,theory,and methodology to address emerging rights demands and contribute to building a new global human rights governance order,so as to underscore the mission of China’s independent human rights knowledge system in the contemporary era and China’s responsibility as a major global actor.China’s human rights research should uphold the dialectical unity between the fundamental principles and innovations,and advance the systemic and theoretical interpretation of its independent human rights knowledge. 展开更多
关键词 China’s independent human rights knowledge system fundamental principles and innovations China’s human rights research China’s human rights development path identifiable human rights concepts in China
原文传递
Weak feedback self-mixing interference fringe slope discrimination method based on deep learning
10
作者 ZHAO Yan LIN Maohua +3 位作者 DU Shengzhi TONG Jigang LIU Bin HAN Fangfang 《Optoelectronics Letters》 2025年第11期684-689,共6页
In order to identify the tilt direction of the self-mixing signals under weak feedback regime interfered by noise,a deep learning method is proposed.The one-dimensional U-Net(1D U-Net)neural network can identify the d... In order to identify the tilt direction of the self-mixing signals under weak feedback regime interfered by noise,a deep learning method is proposed.The one-dimensional U-Net(1D U-Net)neural network can identify the direction of the self-mixing fringes accurately and quickly.In the process of measurement,the measurement signal can be normalized and then the neural network can be used to discriminate the direction.Simulation and experimental results show that the proposed method is suitable for self-mixing interference signals with noise in the whole weak feedback regime,and can maintain a high discrimination accuracy for signals interfered by 5 dB large noise.Combined with fringe counting method,accurate and rapid displacement reconstruction can be realized. 展开更多
关键词 weak feedback identify direction measurement signal DISCRIMINATE self mixing interference weak feedback regime neural network identify tilt direction
原文传递
Understanding user’s identifiability on social media:a supervised machine learning and self-reporting investigation
11
作者 Xi Chen Hao Ding +1 位作者 Jian Mou Yuping Zhao 《Data Science and Management》 2025年第3期270-283,共14页
The identifiability of users as they interact in the digital world is fundamentally linked to privacy and security issues.Identifiability can be divided into two:subjective identifiability,which is based on psychologi... The identifiability of users as they interact in the digital world is fundamentally linked to privacy and security issues.Identifiability can be divided into two:subjective identifiability,which is based on psychological perceptions(i.e.,mental space),and objective identifiability,which is based on social media data(i.e.,information space).This study constructs a prediction model for social media data identifiability of users based on a supervised machine learning technique.The findings,based on data from Weibo,a Chinese social media platform,indicate that the top seven features and values for predicting social media identifiability include blog pictures(0.21),blog location(0.14),birthdate(0.12),location(0.10),blog interaction(0.10),school(0.08),and interests and hobbies(0.07).The relationship between machine-predicted and self-reported identifiability was tested using data from 91 participants.Based on the degree of deviation between the two,users can be divided into four categories—normal,conservative,active,and atypical—which reflect their sensitivity to privacy concerns and preferences regarding information disclosure.This study provides insights into the development of privacy protection strategies based on social media data classification. 展开更多
关键词 IDENTIFIABILITY Social media Mental space Information space Supervised machine learning Privacy and security
在线阅读 下载PDF
Unravelling the deception:identifying cheiro-oral syndrome in the emergency department——case reports
12
作者 Yongyin Qiu Shu Fang Ho 《World Journal of Emergency Medicine》 2025年第2期192-194,共3页
Patients with cheiro-oral syndrome(COS) often present with minor perioral and upper extremity sensory disturbances,which can be easily overlooked in busy emergency departments(EDs).^([1]) COS,a rare spectrum of stroke... Patients with cheiro-oral syndrome(COS) often present with minor perioral and upper extremity sensory disturbances,which can be easily overlooked in busy emergency departments(EDs).^([1]) COS,a rare spectrum of stroke syndromes,necessitates expeditious and aggressive modification of risk factors. 展开更多
关键词 ORAL identifying DEPARTMENT
暂未订购
Sharing gray academic literature with ResearchGate DOIs:Increased discoverability but inaccurate metadata
13
作者 Enrique Orduña-Malea 《Journal of Data and Information Science》 2025年第4期44-65,共22页
Purpose:To describe the characteristics of research outputs using persistent identifiers generated by ResearchGate to gain insight into what publications are shared and disseminated through this functionality,revealin... Purpose:To describe the characteristics of research outputs using persistent identifiers generated by ResearchGate to gain insight into what publications are shared and disseminated through this functionality,revealing their academic and non-academic impact.Design/methodology/approach:A total of 1,092,934 RG-DOIs were collected,using the DataCite API,along with bibliographic metadata for the associated registered output(RG-DOI publications).The subsequent analysis evaluated the publication date,document type,and language.These values were crossreferenced against the full text of a random sample of 666 records to verify accuracy.Findings:RG-DOIs have served primarily to identify and make accessible scholarly gray literature,including posters,presentations,conference papers,and theses,with notable emphasis on publications in Spanish and Portuguese.Around 41,000 citations from Web of Science indexed publications to RG publications are evidence of their infrequent but perceptible use in scholarly discourse.The declining number of registrations of RG-DOIs observed may indicate a shift in researcher preferences to alternative platforms for DOI generation.Research limitations:The study uncovered substantial inconsistencies in DataCite metadata,which can be attributed to the automated DOI registration process and internal changes in the available document types on ResearchGate.Practical implications:The study encountered challenges in conducting a quantitative analysis due to inconsistencies in the metadata.These have potential implications for researchers,practitioners,and librarians relying on RG-DOIs to conduct bibliometric or bibliographic analysis.Originality/value:This study is the first comprehensive analysis of RG-DOIs and,as such,provides a unique perspective into academic gray literature.It also sheds light on the quality of ResearchGate data transmitted to DataCite when registering DOIs. 展开更多
关键词 Article-level metrics Permanent identifiers ResearchGate Social academic networking sites Social media metrics
在线阅读 下载PDF
Commentary on“Delayed covering causes the accumulation of motile sperm,leading to overestimation of sperm concentration and motility with a Makler counting chamber”
14
作者 Elisabetta Tosti 《Asian Journal of Andrology》 2025年第1期135-136,共2页
The analysis of the ejaculate,better known as spermiogram,represents the first and main step to identify whether a series of sperm quality parameters are within the norm and therefore are consistent with normal sperm ... The analysis of the ejaculate,better known as spermiogram,represents the first and main step to identify whether a series of sperm quality parameters are within the norm and therefore are consistent with normal sperm fertilizing capacity.Among these,sperm concentration and motility are the first parameters to be evaluated through an estimation carried out by expert examiners. 展开更多
关键词 identify whether series sperm quality parameters within delayed covering accumulation MOTILITY OVERESTIMATION makler counting chamber motile sperm sperm concentration
原文传递
Topology-driven directed synthesis of metal-organic frameworks
15
作者 Guoying Han Qazi Mohammad Junaid Xiao Feng 《Chinese Journal of Structural Chemistry》 2025年第3期10-11,共2页
Metal-organic frameworks(MOFs)have garnered widespread attention due to their designability and diversity[1].Customization has always been a pursuit of chemists and materials scientists[2].Topology provides a means of... Metal-organic frameworks(MOFs)have garnered widespread attention due to their designability and diversity[1].Customization has always been a pursuit of chemists and materials scientists[2].Topology provides a means of abstracting the complex structures of MOFs by identifying and classifying the fundamental building units and connection patterns,simplifying the understanding of MOF structures[3]. 展开更多
关键词 directed synthesis TOPOLOGY metal organic frameworks identifying classifying fundamental building units
原文传递
Dual-branch spatial-temporal decoupled fusion transformer for safety action recognition in smart grid substation
16
作者 HAO Yu ZHENG Hao +3 位作者 WANG Tongwen WANG Yu SUN Wei ZHANG Shujuan 《Optoelectronics Letters》 2025年第8期507-512,共6页
Smart grid substation operations often take place in hazardous environments and pose significant threats to the safety of power personnel.Relying solely on manual supervision can lead to inadequate oversight.In respon... Smart grid substation operations often take place in hazardous environments and pose significant threats to the safety of power personnel.Relying solely on manual supervision can lead to inadequate oversight.In response to the demand for technology to identify improper operations in substation work scenarios,this paper proposes a substation safety action recognition technology to avoid the misoperation and enhance the safety management.In general,this paper utilizes a dual-branch transformer network to extract spatial and temporal information from the video dataset of operational behaviors in complex substation environments.Firstly,in order to capture the spatial-temporal correlation of people's behaviors in smart grid substation,we devise a sparse attention module and a segmented linear attention module that are embedded into spatial branch transformer and temporal branch transformer respectively.To avoid the redundancy of spatial and temporal information,we fuse the temporal and spatial features using a tensor decomposition fusion module by a decoupled manner.Experimental results indicate that our proposed method accurately detects improper operational behaviors in substation work scenarios,outperforming other existing methods in terms of detection and recognition accuracy. 展开更多
关键词 identify improper operations manual supervision avoid misoperation spatial temporal substation safety action recognition technology dual branch decoupled fusion enhance safety managementin
原文传递
区分物理变化和化学变化
17
作者 朱利香 《疯狂英语(双语世界)》 2025年第2期56-58,80,共4页
Can you identify physical and chemical changes?Have a try!
关键词 identify physical chemical changeshave chemical change physical change
在线阅读 下载PDF
Central post-stroke pain:advances in clinical and preclinical research
18
作者 Xiqian Yuan Siyuan Hu +20 位作者 Xiaochong Fan Chao Jiang Yan Xu Ruochen Hao Zili Xu Yiyang Yu Yousef Rastegar-Kashkooli Leo Huang Tom J Wang Qiao Wang Songxue Su Limin Wang Junyang Wang Menglu Wang Yun Tai Kim Ujjal K Bhawal Fushun Wang Ting Zhao Junmin Wang Xuemei Chen Jian Wang 《Stroke & Vascular Neurology》 2025年第3期391-406,共16页
Central poststroke pain(CPSP)is a medical complication that arises poststroke and significantly impacts the quality of life and social functioning of affected individuals.Despite ongoing research,the exact pathomechan... Central poststroke pain(CPSP)is a medical complication that arises poststroke and significantly impacts the quality of life and social functioning of affected individuals.Despite ongoing research,the exact pathomechanisms of CPSP remain unclear,and practical treatments are still unavailable.Our review aims to systematically analyse current clinical and preclinical studies on CPSP,which is critical for identifying gaps in knowledge and guiding the development of effective therapies.The review will clarify the clinical characteristics,evaluation scales and contemporary therapeutic approaches for CPSP based on clinical investigations.It will particularly emphasise the CPSP model initiated by stroke,shedding light on its underlying mechanisms and evaluating treatments validated in preclinical studies.Furthermore,the review will not only highlight methodological limitations in animal trials but also offer specific recommendations to researchers to improve the quality of future investigations and guide the development of effective therapies.This review is expected to provide valuable insights into the current knowledge regarding CPSP and can serve as a guide for future research and clinical practice.The review will contribute to the scientific understanding of CPSP and help develop effective clinical interventions. 展开更多
关键词 central poststroke pain cpsp therapeutic approaches clinical research preclinical research animal trials PATHOMECHANISMS identifying gaps knowledge clinical preclinical studies
原文传递
Predictors of Short-term Relapse after Successful Smoking Cessation among Patients Attending Smoking Cessation Clinics in China,2019–2021:A Retrospective Cohort Study
19
作者 Li Xie Shiwei Liu +1 位作者 Xinying Zeng Lin Xiao 《Biomedical and Environmental Sciences》 2025年第12期1544-1549,共6页
The Chinese government promotes smoking cessation through smoking cessation clinics(SCCs).This study aimed to identify factors associated with relapse and provide evidence to inform interventions that reduce relapse r... The Chinese government promotes smoking cessation through smoking cessation clinics(SCCs).This study aimed to identify factors associated with relapse and provide evidence to inform interventions that reduce relapse risk.Participants were SCC patients aged≥18 years who enrolled between June 2019 and December 2021,completed follow-up assessments at one and three months,and reported abstinence at one month.Short-term relapse was defined as self-reported smoking at the three-month follow-up.Treatments included counseling,first-line cessation medications,and traditional Chinese medicine(TCM).Logistic regression was used to identify factors associated with short-term relapse.Among 10,724 eligible SCC patients,11.6%experienced short-term relapse.Factors positively associated with relapse included the number of previous quit attempts(1–5 attempts:OR=1.422,95%CI:1.254–1.613,>5 attempts:OR=1.382,95%CI:1.057–1.808),high perceived difficulty in quitting(OR=1.297,95%CI:1.061–1.586),and moderate(OR=1.383,95%CI:1.174–1.629)or weak(OR=1.517,95%CI:1.251–1.841)willingness to quit.Factors negatively associated with relapse included having a college degree or higher(OR=0.796;95%CI:0.650–0.973),high confidence in quitting(OR=0.786;95%CI:0.629–0.983),and use of TCM(OR=0.276;95%CI:0.158–0.482).Enhancing self-efficacy in quitting appears crucial for preventing short-term relapse.The use of TCM may reduce relapse risk and warrants further investigation. 展开更多
关键词 identify factors associated relapse Chinese patients smoking cessation logistic regression smoking cessation clinics smoking cessation clinics sccs PREDICTORS RELAPSE
暂未订购
System Structure Analysis of the Factors Influencing the“Energy Trilemma”in China’s Natural Gas Industry
20
作者 Li Qiaochu Luo Pingya Zhang Peng 《China Oil & Gas》 2025年第3期34-40,共7页
Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimens... Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimensional system of“safety and stability-economic feasibility-low-carbon and environmental protection,”an influencing factor system for the“Energy Trilemma”in the natural gas industry is constructed. 展开更多
关键词 natural gas safety stability natural gas industry influencing factor system energy trilemma identifying key action point low carbon environmental protection economic feasibility
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部