期刊文献+
共找到160篇文章
< 1 2 8 >
每页显示 20 50 100
Permissive hypercapnia combined with goal-directed fluid therapy improve postoperative mental health in elderly patients undergoing laparoscopic surgery
1
作者 Li Yuan Xiao-Min Zhang +4 位作者 Na Liu Jun-Qi Shi Xiao-Jie Sun Guo-Li Li Jin-Liang Teng 《World Journal of Psychiatry》 2025年第7期145-155,共11页
BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients... BACKGROUND An investigation is undertaken to assess the effects of permissive hypercapnia(PH)combined with goal-directed fluid therapy(GDFT)on postoperative recovery and psychological well-being among elderly patients undergoing laparoscopic surgical procedures.AIM To ascertain whether the combination of PH and GDFT improves clinical recovery indicators,reduces postoperative complications,and alleviates anxiety,depression,and inflammatory responses in this specific patient population.METHODS A total of 120 elderly patients who underwent laparoscopic surgery in our hospital from July 2023 to June 2024 were randomly allocated into two groups:A control group(n=60)and a study group(n=60).In the control group,conventional anesthesia ventilation and fluid management protocols were administered,while in the study group,PH(with intraoperative PaCO_(2) maintained between 45-55 mmHg)was combined with GDFT.Postoperative recovery indicators,including the time to first flatus,time to ambulation,and length of hospital stay,were compared between the groups.Additionally,complication rates,anxietydepression scores assessed via the Hospital Anxiety and Depression scale,and levels of inflammatory factors were analyzed to evaluate the outcomes.RESULTS When compared with the control group,the study group demonstrated significantly shorter time to first flatus[(48.3±6.2)hours vs(62.5±7.8)hours],time to ambulation[(28.4±4.2)hours vs(38.6±5.1)hours],and length of hospital stay[(5.2±1.1)days vs(7.4±1.3)days](P<0.05).A significantly lower postoperative complication rate was observed in the study group(8.3%vs 21.7%,P<0.05).Additionally,at 3 days postoperatively,significantly lower anxiety scores[(5.2±1.4)vs(7.8±1.6)]and depression scores[(4.8±1.2)vs(7.1±1.5)]were recorded in the study group compared to the control group(P<0.05);Furthermore,at 24 hours postoperatively,serum levels of interleukin-6,tumor necrosis factorα,and C-reactive protein were found to be significantly lower in the study group than in the control group(P<0.05).CONCLUSION Postoperative recovery is significantly expedited,postoperative complications are markedly reduced,anxietydepression status is substantially improved,and inflammatory response is notably diminished in elderly patients undergoing laparoscopic surgery when PH is combined with GDFT,thereby making it worthy of clinical application. 展开更多
关键词 permissive hypercapnia Goal-directed fluid therapy Laparoscopic surgery Elderly patients Enhanced recovery Anxiety and depression
暂未订购
A microfluidic cell chip for virus isolation via rapid screening for permissive cells 被引量:2
2
作者 Weide Su Jingjiang Qiu +3 位作者 Ying Mei Xian-En Zhang Yong He Feng Li 《Virologica Sinica》 SCIE CAS CSCD 2022年第4期547-557,共11页
Virus identification is a prerequisite not only for the early diagnosis of viral infectious diseases but also for the effective prevention of epidemics.Successful cultivation is the gold standard for identifying a vir... Virus identification is a prerequisite not only for the early diagnosis of viral infectious diseases but also for the effective prevention of epidemics.Successful cultivation is the gold standard for identifying a virus,according to the Koch postulates.However,this requires screening for a permissive cell line,which is traditionally time-,reagent-and labor-intensive.Here,a simple and easy-to-operate microfluidic chip,formed by seeding a variety of cell lines and culturing them in parallel,is reported for use in virus cultivation and virus-permissive host-cell screening.The chip was tested by infection with two known viruses,enterovirus 71(EV71)and influenza virus H1N1.Infection with EV71 and H1N1 caused significant cytopathic effects(CPE)in RD and MDCK cells,respectively,demonstrating that virus cultivation based on this microfluidic cell chip can be used as a substitute for the traditional plate-based culture method and reproduce the typical CPE caused by virus infection.Using this microfluidic cell chip method for virus cultivation could make it possible to identify an emerging virus in a highthroughput,automatic,and unprecedentedly fast way. 展开更多
关键词 Virus cultivation Microfluidic cell chip permissive cell Enterovirus 71(EV71) Influenza virus
原文传递
Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair? 被引量:2
3
作者 Hyman M. Schipper 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第2期208-210,共3页
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ... 'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues. 展开更多
关键词 GENE HO Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair GFAP
暂未订购
Lateral olfactory tract usher substance(LOTUS) protein,an endogenous Nogo receptor antagonist,converts a non-permissive to permissive brain environment for axonal regrowth
4
作者 Tomoko Hirokawa Kohtaro Takei 《Neural Regeneration Research》 SCIE CAS CSCD 2018年第7期1193-1194,共2页
It is well known that primates,including humans,hardly recover motor function after spinal cord injury(SCI)when compared with non-primate mammals such as rodents.This limited functional recovery is in part due to a ... It is well known that primates,including humans,hardly recover motor function after spinal cord injury(SCI)when compared with non-primate mammals such as rodents.This limited functional recovery is in part due to a non-permissive environment of the central nervous system(CNS)inhibiting axonal regrowth. 展开更多
关键词 MAG Lateral olfactory tract usher substance protein an endogenous Nogo receptor antagonist converts a non-permissive to permissive brain environment for axonal regrowth LOTUS SCI CNS
暂未订购
Evaluation of Concentrations and Dispersion of Heavy Metals in Soils Surrounding Artisanal and Small-Scale Gold Mining in Chunya District,Mbeya
5
作者 Fredrick P.Girenga Nelson Mpumi +1 位作者 Ruth L.Moirana Revocatus L.Machunda 《Journal of Geoscience and Environment Protection》 2025年第11期286-314,共29页
Heavy metal contamination from Artisanal and Small-Scale Gold Mining(ASGM)is increasingly recognized as a global issue,impacting soil quality and public health.In Tanzania,while ASGM activities significantly bolster l... Heavy metal contamination from Artisanal and Small-Scale Gold Mining(ASGM)is increasingly recognized as a global issue,impacting soil quality and public health.In Tanzania,while ASGM activities significantly bolster local economies,they also pose serious environmental risks.This study examined the levels and dispersion of heavy metals,specifically mercury(Hg),lead(Pb),arsenic(As),zinc(Zn),and cadmium(Cd)in the Chunya district.Soil samples were collected from both active and abandoned tailing heaps and analysed by Atomic Absorption Spectroscopy(AAS),with the results compared to the WHO/FAO(2008)guidelines for agricultural soils.The findings revealed alarming concentrations of Hg across all sampling points,ranging from 0.88 to 3.72 mg·kg^(−1).In contrast,48 out of 51 sampling points exhibited higher Cd levels between 0.98 and 4.42 mg/kg,exceeding the safe limits of 0.5 mg·kg^(−1)for Hg and 0.8 mg·kg^(−1)for Cd.In contrast,the negative control site showed much lower levels(0.03mg·kg^(−1)for Cd and 0.43 mg·kg^(−1)for Hg).A notable decrease in heavy metal concentrations was observed with increasing distance from the tailing heaps(0 m to 200 m).Soil pH and electrical conductivity significantly influenced the mobility of these contaminants,with higher concentrations found near lower tailing heaps.The elevated levels of Hg and Cd present substantial risks to human health and ecosystems,highlighting the urgent need for effective remediation strategies.Furthermore,the gold mining industry must innovate technologies that minimize heavy metal release during extraction processes to mitigate environmental harm. 展开更多
关键词 Heavy Metals Tailing Heaps Lateral Mobility Permissible Limit Environmental Risks Human Health
在线阅读 下载PDF
On the Evils of Torture and Its Permissibility:A Discussion Centered on Kramer’s View of Torture
6
作者 ZHANG Zhucheng PAN Yingzhao(Translated) 《The Journal of Human Rights》 2025年第1期209-233,共25页
In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness ... In the legal and philosophical study of torture,two major problems arise:Why is torture evil(Problem 1)?And is there a form of permissible torture(Problem 2)?The key issue in Problem 1 is demonstrating the uniqueness of the evils of torture,while Problem 2 aims to find a suitable theory to balance the“intuitive rejection”and“intuition of exceptional cases”in the ticking bomb scenario.Existing mainstream approaches have generally failed to resolve these issues.However,Matthew Kramer’s view of torture addresses both aspects of these problems.For Problem 1,Kramer adopts a perpetrator-centered viewpoint,arguing that torture undermines the moral integrity of the perpetrator.Regarding Problem 2,he suggests that the situation we face is a moral conflict in which the use of torture is morally wrong but might be the best action in a given context,granting it a weaker form of permissibility.However,in terms of the evils of torture,Kramer fails to explain its uniqueness.His theory cannot apply to all types of torture,and his perpetrator-centered argument contains logical flaws.Regarding the permissibility of torture,while Kramer’s overall approach is correct,he does not provide a reasonable explanation of the moral obligation to“forbid torture”or the prima facie surrounding it.A correct view of torture should adhere to an inmate-centered viewpoint,understanding the evils of torture in an additive manner in Problem 1,and acknowledging the existence of moral conflict in Problem 2.It should not only demonstrate that,in some situations,the use of torture may be the morally best option,but also show that the moral obligation to prohibit torture is simply outweighed under these circumstances. 展开更多
关键词 TORTURE inquisition by torture Matthew Kramer evil of torture permissibility of torture
原文传递
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS
7
作者 Mochan Fan Zhipeng Zhang +4 位作者 Zonghang Li Gang Sun Hongfang Yu Jiawen Kang Mohsen Guizani 《Digital Communications and Networks》 2025年第3期837-849,共13页
Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing sol... Vertical Federated Learning(VFL),which draws attention because of its ability to evaluate individuals based on features spread across multiple institutions,encounters numerous privacy and security threats.Existing solutions often suffer from centralized architectures,and exorbitant costs.To mitigate these issues,in this paper,we propose SecureVFL,a decentralized multi-party VFL scheme designed to enhance efficiency and trustworthiness while guaranteeing privacy.SecureVFL uses a permissioned blockchain and introduces a novel consensus algorithm,Proof of Feature Sharing(PoFS),to facilitate decentralized,trustworthy,and high-throughput federated training.SecureVFL introduces a verifiable and lightweight three-party Replicated Secret Sharing(RSS)protocol for feature intersection summation among overlapping users.Furthermore,we propose a(_(2)^(4))-sharing protocol to achieve federated training in a four-party VFL setting.This protocol involves only addition operations and exhibits robustness.SecureVFL not only enables anonymous interactions among participants but also safeguards their real identities,and provides mechanisms to unmask these identities when malicious activities are performed.We illustrate the proposed mechanism through a case study on VFL across four banks.Finally,our theoretical analysis proves the security of SecureVFL.Experiments demonstrated that SecureVFL outperformed existing multi-party VFL privacy-preserving schemes,such as MP-FedXGB,in terms of both overhead and model performance. 展开更多
关键词 Permissioned blockchain Vertical federated learning Privacy protection Replicated secret sharing
在线阅读 下载PDF
Corrigendum regarding previously published articles
8
《Data Science and Management》 2025年第1期116-116,共1页
The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition base... The editors regret that the following statements were missing in the published version for the following articles that appeared in previous issues of Data Science and Management:1.“Audiovisual speech recognition based on a deep convolutional neural network”(Data Science and Management,2024,7(1):25–34).https://doi.org/10.1016/j.dsm.2023.10.002.Ethics statement:The authors declare the Institutional Ethics Committee confirmed that no ethical review was required for this study.The authors have taken the participants’permission and consent to participate in this study. 展开更多
关键词 deep convolutional neural network data data science participant permission ethical review audiovisual speech recognition ethics statement deep convolutional neural network institutional ethics committee
在线阅读 下载PDF
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
9
作者 Rahul Gupta Kapil Sharma R.K.Garg 《Computers, Materials & Continua》 SCIE EI 2024年第3期4283-4301,共19页
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature. 展开更多
关键词 ANDROID MALWARE android security hybrid analysis permission and system call pairs
在线阅读 下载PDF
A Note on a One-Parameter Weibull Distributed Deteriorating Item EOQ Inventory Model with Varying Quadratic Demand and Delay in Payments
10
作者 Trailokyanath Singh Itishree Rout Ameeya Kumar Nayak 《American Journal of Operations Research》 2024年第5期151-167,共17页
In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate consi... In this paper, an EOQ inventory model is developed for deteriorating items with variable rates of deterioration and conditions of grace periods when demand is a quadratic function of time. The deterioration rate considered here is a special type of Weibull distribution deterioration rate, i.e., a one-parameter Weibull distribution deterioration rate and it increases with respect to time. The quadratic demand precisely depicts of the demand of seasonal items, fashion apparels, cosmetics, and newly launched essential commodities like android mobiles, laptops, automobiles etc., coming to the market. The model is divided into three policies according to the occurrence of the grace periods. Shortages, backlogging and complete backlogging cases are not allowed to occur in the model. The proposed model is well-explained with the help of a simple solution procedure. The three numerical examples are taken to illustrate the effectiveness of the EOQ inventory model along with sensitivity analysis. 展开更多
关键词 Economic Order Quantity (EOQ) One-Parameter Weibull Distribution Deterioration Permissible Delay in Payments Time-Dependent Quadratic Demand
在线阅读 下载PDF
Android Permission机制的实现与安全分析 被引量:6
11
作者 张中文 雷灵光 王跃武 《信息网络安全》 2012年第8期3-6,共4页
Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permis... Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permission机制漏洞。应用程序利用该漏洞可以绕过权限管理,主动提升应用程序的访问权限,为后续攻击提供支持。同时文章也对Permission机制其它方面的安全特性进行了分析。 展开更多
关键词 ANDROID系统 PERMISSION 安全 漏洞
在线阅读 下载PDF
Key details of the duodenal-jejunal bypass in type 2 diabetes mellitus rats 被引量:5
12
作者 Li-Ou Han Chun Song +2 位作者 Chun-Fang Song Li-Hong Zhou Su-Jun Cheng 《World Journal of Gastroenterology》 SCIE CAS CSCD 2011年第45期5021-5027,共7页
AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastri... AIM: To investigate which surgical techniques and perioperative regimens yielded the best survival rates for diabetic rats undergoing gastric bypass. METHODS: We performed Roux-en-Y gastric bypass with reserved gastric volume, a procedure in which gastrointestinal continuity was reestablished while excluding the entire duodenum and proximal jejunal loop. We observed the procedural success rate, long-term survival, and histopathological sequelae associated with a number of technical modifications. These included: use of anatomical markers to precisely identify Treitz's ligament; careful dissection along surgical planes; careful attention to the choice of regional transection sites; reconstruction using full-thickness anastomoses; use of a minimally invasive procedure with prohemostatic pretreatment and hemorrhage control; prevention of hypo-thermic damage; reduction in the length of the procedure; and accelerated surgical recovery using fast-track surgical modalities such as perioperative permissive underfeeding and goal-directed volume therapy. RESULTS: The series of modif ications we adopted reduced operation time from 110.02 ± 12.34 min to 78.39 ± 7.26 min (P < 0.01), and the procedural success rate increased from 43.3% (13/30) to 90% (18/20) (P < 0.01), with a long-term survival of 83.3% (15/18) (P < 0.01). CONCLUSION: Using a number of fast-track and damage control surgical techniques, we have successfully established a stable model of gastric bypass in diabetic rats. 展开更多
关键词 Duodenal-jejunal bypass Type 2 diabetes mellitus Minimally invasive surgery Fast-track surgery Damage control surgery permissive underfeeding Goal-directed volume therapy
在线阅读 下载PDF
一种增强的Android安全机制模型 被引量:9
13
作者 陈伟鹤 邱道龙 《无线通信技术》 2014年第1期37-41,共5页
随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Plo... 随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Ploy安装程序之前先对应用程序和权限进行分析检测,然后将检测分析后的权限呈现给用户。实验结果表明在造成一定性能损失的情况下,新的框架可以有效减少用户所需设置的权限。 展开更多
关键词 ANDROID ANDROID PERMISSION 安全 策略模型
原文传递
Android操作系统的安全机制研究 被引量:2
14
作者 朱长江 杨一平 《电脑知识与技术》 2013年第9期5628-5629,共2页
Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Li... Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Linux内核方面及Android自身权限机制方面存在的安全隐患。 展开更多
关键词 ANDROID 安全机制 PERMISSION
在线阅读 下载PDF
浅谈司法公证材料的英译
15
作者 周永秀 毕研韬 《语言教育》 2002年第3期35-36,共2页
司法公证翻译因关系到当事人在境内外的权利和义务而应格外严谨准确。笔者近年来受有关部门及当事人的委托承担了部分公证材料的翻译,从各国签证官和国外机构获得了大量有益的信息反馈,现不揣冒昧从文体特征。
关键词 机构名称 信息反馈 语法方面 thereafter translated 语义模糊 大学外国语 WISDOM PERMISSION 发证日期
在线阅读 下载PDF
The Relationship Between Parents’ Demographic Factors and Parenting Styles: Effects on Children’s PsychologicalAdjustment
16
作者 Demetris Hadjicharalambous Loucia Dimitriou 《Psychology Research》 2020年第4期125-139,共15页
The present study explored the extent to which parent’s demographic characteristics,such as age,gender,education,place of residence,and family income have an influence on the parental style they adopt and consequentl... The present study explored the extent to which parent’s demographic characteristics,such as age,gender,education,place of residence,and family income have an influence on the parental style they adopt and consequently on their perception of their children’s psychological adjustment in regards to their family relationships,peer relationships,school performance,and the development of their self-esteem.Various studies conducted in the past as well as in recent years indicate that parental demographic characteristics are significantly linked with parenting behavior(parental styles)and predict the way parents perceive their children’s adjustment,development,and school achievement.The present study was quantitative and we applied three different self-report questionnaires,namely,a Personal Information Form(PIF)for the demographic data,the Parental Authority Styles(PAQ)Questionnaire,and the Questionnaire of Children’s Family Relations,School Performance,Social Competence,and Self-Esteem.We administered the instruments to 336 Cypriot parents(23%fathers and 77%mothers).Our results showed that parent’s demographics are significantly related to the parenting styles they adopt.Furthermore,authoritative parenting is significantly correlated with positive parental perceptions of children’school performance,family relationships,social skills,and self-esteem.On the contrary,authoritarian parenting is a significant negative predictor to parental perceptions of children’s adjustment in the aforementioned areas of development. 展开更多
关键词 AUTHORITARIAN AUTHORITATIVE children adjustment parenting styles permissive
在线阅读 下载PDF
一类SCO OpenServer 5中远程访问故障的分析和处理
17
作者 黄宁 李岚 《江西科学》 2007年第1期79-80,85,共3页
提出一类SCO OpenServer 5中远程访问常见的问题,分析其原因,提出解决方法,找到了解决这类问题的关键。
关键词 远程访问 对等用户 Rcmd Rlogin PERMISSION Denied
在线阅读 下载PDF
Developing Framework to Test Driving Performance at Left-Turn Movement with In-Vehicle Advance Collision Warning Message
18
作者 Mahreen Nabi Fengxiang Qiao +1 位作者 Boya You Lei Yu 《Journal of Transportation Technologies》 2016年第1期30-42,共13页
Left-turning traffic without a protected left-turn signal is one of the major safety concerns at urban intersections. Though an average of only l0% - 15% of all approaching traffic turns left, significantly a large pr... Left-turning traffic without a protected left-turn signal is one of the major safety concerns at urban intersections. Though an average of only l0% - 15% of all approaching traffic turns left, significantly a large proportion of left-turn crashes occur involving 21% of all intersection fatal crashes. Where traditional safety countermeasures of signal timing-phasing and use of flashing yellow light have reportedly failed to significantly reduce the rate of crashes, an in-vehicle advance collision warning message can be helpful to reduce left-turn collisions at intersections. In this study, an in-vehicle audio warning application has been designed by providing two safety warning messages (Advance Warning Message and Safe Left-turn Maneuver Message) under the vehicle to vehicle (V2V) communication system, which is triggered based on the acceptable gaps of oncoming opposing vehicles for a safe left-turn. A driving simulator test has been conducted with 30 participants to investigate the impacts of warning messages on performance measures such as speed and acceleration profiles, collision records, brake reaction distance, and intersection clearance time. Statistical results showed that with the help of these messages, all participants were able to reduce speeds and accelerations and chose suitable gaps without potential conflicts. Moreover, the results of questionnaire analysis provide a positive acceptability especially for the Safe Left-turn Maneuver Message. Based on the performance measurements, this type of safety warning messages can be recommended for possible real-road tests for practical applications. 展开更多
关键词 Left-Turn permissive Phase OFFSET Collision Warning System Intelligent Transportation System Intersection Safet
在线阅读 下载PDF
基于权限管理的Android应用行为检测 被引量:8
19
作者 刘智伟 孙其博 《信息网络安全》 2014年第6期72-77,共6页
随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用A... 随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用Android系统Permission机制的动态检查模式实现应用运行时行为的检测。Android应用通过<user-permission>申请所需权限,在运行过程中需要调用对应的API或者访问系统数据时,会发生系统权限检查,从而实现对应用行为的监控。相对在应用层进行应用行为的监控要更简洁有效,通过在框架层的定制更好地实现了对应用行为的监控,同时带给系统的损耗更小。 展开更多
关键词 应用行为 Permission机制 权限动态检查
在线阅读 下载PDF
基于API和Permission的Android恶意软件静态检测方法研究 被引量:3
20
作者 杨鸣坤 罗锦光 +1 位作者 欧跃发 慕德俊 《计算机应用与软件》 北大核心 2020年第4期53-58,104,共7页
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态... 当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态反编译,提取其中的静态信息;对静态信息中的API和Permission进行统计学分析,得到API和Permission在恶意APK和正常APK中的使用率;根据它们的使用率确定基准API和Permission集合,将每一个APK转换成可参与计算的关于API和Permission的特征向量;利用改进的k-NN分类器,对待检测的APK进行分类判定。实验结果表明,该方法可以有效地对APK进行恶意分类。 展开更多
关键词 ANDROID 恶意软件 静态检测 PERMISSION 机器学习
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部