期刊文献+
共找到272,901篇文章
< 1 2 250 >
每页显示 20 50 100
SegInfer:Binary Network Protocol Segmentation Based on Probabilistic Inference
1
作者 Guo Maohua Zhu Yuefei Fei Jinlong 《China Communications》 2025年第6期334-354,共21页
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len... Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results. 展开更多
关键词 binary protocol probabilistic inference protocol field segmentation protocol reverse engineering related construction
在线阅读 下载PDF
Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review
2
作者 Priyanka Manjit Kaur +2 位作者 Deepak Prashar Leo Mrsic Arfat Ahmad Khan 《Computers, Materials & Continua》 2025年第2期1615-1643,共29页
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F... “Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research. 展开更多
关键词 FANET protocol machine learning
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
3
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
Multi-radio fast routing recovery protocol based on spectrum situation awareness
4
作者 Chuanxin ZHOU Chao DONG +3 位作者 Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN 《Chinese Journal of Aeronautics》 2025年第3期435-446,共12页
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols. 展开更多
关键词 UAV ad hoc network OLSR protocol Routing recovery Electromagnetic spectrum situation awareness MULTI-RADIO
原文传递
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks 被引量:1
5
作者 Youseef Alotaibi B.Rajasekar +1 位作者 R.Jayalakshmi Surendran Rajendran 《Computers, Materials & Continua》 SCIE EI 2024年第3期4243-4262,共20页
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect... Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods. 展开更多
关键词 Vehicular networks communication protocol CLUSTERING falcon optimization algorithm ROUTING
在线阅读 下载PDF
Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems 被引量:1
6
作者 Zongyu Zuo Jingchuan Tang +1 位作者 Ruiqi Ke Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1381-1397,共17页
This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global ... This paper investigates the problem of global/semi-global finite-time consensus for integrator-type multi-agent sys-tems.New hyperbolic tangent function-based protocols are pro-posed to achieve global and semi-global finite-time consensus for both single-integrator and double-integrator multi-agent systems with leaderless undirected and leader-following directed commu-nication topologies.These new protocols not only provide an explicit upper-bound estimate for the settling time,but also have a user-prescribed bounded control level.In addition,compared to some existing results based on the saturation function,the pro-posed approach considerably simplifies the protocol design and the stability analysis.Illustrative examples and an application demonstrate the effectiveness of the proposed protocols. 展开更多
关键词 Consensus protocol finite-time consensus hyper-bolic tangent function multi-agent systems.
在线阅读 下载PDF
Unknown Application Layer Protocol Recognition Method Based on Deep Clustering 被引量:1
7
作者 Wu Jisheng Hong Zheng +1 位作者 Ma Tiantian Si Jianpeng 《China Communications》 SCIE CSCD 2024年第12期275-296,共22页
In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extract... In recent years,many unknown protocols are constantly emerging,and they bring severe challenges to network security and network management.Existing unknown protocol recognition methods suffer from weak feature extraction ability,and they cannot mine the discriminating features of the protocol data thoroughly.To address the issue,we propose an unknown application layer protocol recognition method based on deep clustering.Deep clustering which consists of the deep neural network and the clustering algorithm can automatically extract the features of the input and cluster the data based on the extracted features.Compared with the traditional clustering methods,deep clustering boasts of higher clustering accuracy.The proposed method utilizes network-in-network(NIN),channel attention,spatial attention and Bidirectional Long Short-term memory(BLSTM)to construct an autoencoder to extract the spatial-temporal features of the protocol data,and utilizes the unsupervised clustering algorithm to recognize the unknown protocols based on the features.The method firstly extracts the application layer protocol data from the network traffic and transforms the data into one-dimensional matrix.Secondly,the autoencoder is pretrained,and the protocol data is compressed into low dimensional latent space by the autoencoder and the initial clustering is performed with K-Means.Finally,the clustering loss is calculated and the classification model is optimized according to the clustering loss.The classification results can be obtained when the classification model is optimal.Compared with the existing unknown protocol recognition methods,the proposed method utilizes deep clustering to cluster the unknown protocols,and it can mine the key features of the protocol data and recognize the unknown protocols accurately.Experimental results show that the proposed method can effectively recognize the unknown protocols,and its performance is better than other methods. 展开更多
关键词 attention mechanism clustering loss deep clustering network traffic unknown protocol recognition
在线阅读 下载PDF
A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic
8
作者 Ke Yang Meihua Xiao Zehuan Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2641-2663,共23页
Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and elec... Fair exchange protocols play a critical role in enabling two distrustful entities to conduct electronic data exchanges in a fair and secure manner.These protocols are widely used in electronic payment systems and electronic contract signing,ensuring the reliability and security of network transactions.In order to address the limitations of current research methods and enhance the analytical capabilities for fair exchange protocols,this paper proposes a formal model for analyzing such protocols.The proposed model begins with a thorough analysis of fair exchange protocols,followed by the formal definition of fairness.This definition accurately captures the inherent requirements of fair exchange protocols.Building upon event logic,the model incorporates the time factor into predicates and introduces knowledge set axioms.This enhancement empowers the improved logic to effectively describe the state and knowledge of protocol participants at different time points,facilitating reasoning about their acquired knowledge.To maximize the intruder’s capabilities,channel errors are translated into the behaviors of the intruder.The participants are further categorized into honest participants and malicious participants,enabling a comprehensive evaluation of the intruder’s potential impact.By employing a typical fair exchange protocol as an illustrative example,this paper demonstrates the detailed steps of utilizing the proposed model for protocol analysis.The entire process of protocol execution under attack scenarios is presented,shedding light on the underlying reasons for the attacks and proposing corresponding countermeasures.The developedmodel enhances the ability to reason about and evaluate the security properties of fair exchange protocols,thereby contributing to the advancement of secure network transactions. 展开更多
关键词 Fair exchange protocols FAIRNESS formal analysis logic reasoning
在线阅读 下载PDF
A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks
9
作者 Mosab Manaseer Maram Bani Younes 《Computer Systems Science & Engineering》 2024年第6期1699-1721,共23页
This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication... This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication among traveling vehicles.Finally,it aims to find a secure solution to prevent blackhole attacks on vehicular network communications.The proposed solution relies on authenticating vehicles by joining a blockchain network.This technology provides identification information and receives cryptography keys.Moreover,the ad hoc on-demand distance vector(AODV)protocol is used for route discovery and ensuring reliable node communication.The system activates an adaptive mode for monitoring communications and continually adjusts trust scores based on packet delivery performance.From the experimental study,we can infer that the proposed protocol has successfully detected and prevented blackhole attacks for different numbers of simulated vehicles and at different traveling speeds.This reduces accident rates by 60%and increases the packet delivery ratio and the throughput of the connecting network by 40%and 20%,respectively.However,extra overheads in delay and memory are required to create and initialize the blockchain network. 展开更多
关键词 Vehicular networks blockchain collision avoidance protocol design security mechanisms
在线阅读 下载PDF
Treatment of active ulcerative colitis with Yinmei Kuijie decoction combined with 5-aminosalicylic acid:A non-randomized multicenter prospective observational protocol based on real-world conditions
10
作者 Xinyu Zhang Yuan Li +5 位作者 Ping Li Yunze Liu Junmei Zhang Jingwei Wu Qi Wang Xia Ding 《Journal of Traditional Chinese Medical Sciences》 CAS 2024年第4期423-427,共5页
Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Method... Objective:To determine the efficacy and safety of the Yinmei Kuijie decoction combined with 5-ami-nosalicylic acid(5-ASA)in treating mildly to moderately active ulcerative colitis(UC)under real-world conditions.Methods:This multicenter,prospective,non-randomized,observational study will be conducted in real-world settings.A total of 204 eligible patients will be consecutively enrolled in the study.Patients in the combination treatment group will receive Yinmei Kuijie decoction in combination with 5-ASA,whereas those in the control group will be treated with 5-ASA alone.The primary endpoint will be a clinical response at week 12,defined as a≥3 point and≥30%reduction from baseline in the Mayo total score with≥1 reduction in rectal bleeding or rectal bleeding score=0 or 1.Secondary efficacy endpoints at week 12 will include health-related quality of life,mucosal healing,and inflammation indicators.Conclusion:The results of this study may provide evidence of the efficacy and safety of Yinmei Kuijie decoction combined with 5-ASA in treating patients with mildly to moderately active UC under real-world principles.The results will provide a basis for further confirmatory studies on the efficacy of Yinmei Kuijie decoction. 展开更多
关键词 Chinese medicine 5-aminosalicylic acid Ulcerative colitis Real-world study Study protocol Observational study
暂未订购
Priority Based Energy Efficient MAC Protocol by Varying Data Ratefor Wireless Body Area Network
11
作者 R.Sangeetha Usha Devi Gandhi 《Computer Systems Science & Engineering》 2024年第2期395-411,共17页
Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor ... Wireless Body Area Network(WBAN)is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body.WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature,blood pressure,pulse rate,oxygen level,body motion,and so on.They sense the data and communicate it to the Body Area Network(BAN)Coordinator.The main challenge for the WBAN is energy consumption.These issues can be addressed by implementing an effective Medium Access Control(MAC)protocol that reduces energy consumption and increases network lifetime.The purpose of the study is to minimize the energy consumption and minimize the delay using IEEE 802.15.4 standard.In our proposed work,if any critical events have occurred the proposed work is to classify and prioritize the data.We gave priority to the highly critical data to get the Guarantee Tine Slots(GTS)in IEEE 802.15.4 standard superframe to achieve greater energy efficiency.The proposed MAC provides higher data rates for critical data based on the history and current condition and also provides the best reliable service to high critical data and critical data by predicting node similarity.As an outcome,we proposed a MAC protocol for Variable Data Rates(MVDR).When compared to existing MAC protocols,the MVDR performed very well with low energy intake,less interruption,and an enhanced packet-sharing ratio. 展开更多
关键词 Wireless Body Area Network(WBAN) IEEE 802.15.4 energy efficiency MAC protocol ZIGBEE
在线阅读 下载PDF
Enhancing resistance to bacterial blight in rice using CRISPR-based base editing technology 被引量:1
12
作者 Chenhao Li Bo Liu +1 位作者 Hansong Dong Bing Yang 《The Crop Journal》 2025年第1期115-124,共10页
Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is cruci... Bacterial blight(BB),caused by Xanthomonas oryzae pathovar oryzae(Xoo),poses a significant threat to rice production,particularly in Asia and West Africa.Breeding resistance against BB in elite rice varieties is crucial to advancing rice breeding program and supporting smallholder farmers.Transcription Activator-Like effectors(TALes)are key virulence factors in Xoo,with some targeting the susceptibility(S)genes such as the sugar transporter SWEET genes in rice.Among these,SWEET14 is an important S gene,with its promoter bound by the TALe TalC which exists across all sequenced African Xoo isolates.In the present study,we utilized CRISPR/Cas9-based cytidine and adenine base editors to alter the effector binding element(EBE)of TalC in the promoter of SWEET14 in rice cultivars Kitaake,IR24,and Zhonghua 11.Mutations with C to T changes in EBE led to reduced SWEET14 induction by TalC-containing Xoo strains,resulting in resistance to African Xoo isolates reliant on TalC for virulence.Conversely,A to G changes retained SWEET14 inducibility and susceptibility to Xoo in edited lines.Importantly,no off-target mutations were detected at predicted sites,and the edited lines exhibited no obvious defects in major agronomic traits in Kitaake.These results underscore the effectiveness of base editing systems for both molecular biology research and crop improvement endeavors. 展开更多
关键词 Base editing Base editors CBE and ABE Rice improvement Bacterial blight resistance
在线阅读 下载PDF
Evolutionary Particle Swarm Optimization Algorithm Based on Collective Prediction for Deployment of Base Stations
13
作者 Jiaying Shen Donglin Zhu +5 位作者 Yujia Liu Leyi Wang Jialing Hu Zhaolong Ouyang Changjun Zhou Taiyong Li 《Computers, Materials & Continua》 SCIE EI 2025年第1期345-369,共25页
The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(I... The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life.The development of the Internet of Things(IoT)relies on the support of base stations,which provide a solid foundation for achieving a more intelligent way of living.In a specific area,achieving higher signal coverage with fewer base stations has become an urgent problem.Therefore,this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization(EPSO)algorithm based on collective prediction,referred to herein as ECPPSO.Introducing a new strategy called neighbor-based evolution prediction(NEP)addresses the issue of premature convergence often encountered by PSO.ECPPSO also employs a strengthening evolution(SE)strategy to enhance the algorithm’s global search capability and efficiency,ensuring enhanced robustness and a faster convergence speed when solving complex optimization problems.To better adapt to the actual communication needs of base stations,this article conducts simulation experiments by changing the number of base stations.The experimental results demonstrate thatunder the conditionof 50 ormore base stations,ECPPSOconsistently achieves the best coverage rate exceeding 95%,peaking at 99.4400%when the number of base stations reaches 80.These results validate the optimization capability of the ECPPSO algorithm,proving its feasibility and effectiveness.Further ablative experiments and comparisons with other algorithms highlight the advantages of ECPPSO. 展开更多
关键词 Particle swarm optimization effective coverage area global optimization base station deployment
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
14
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol Code crimson HAEMORRHAGE Trauma
暂未订购
Design,synthesis,and detection of Al^(3+)of two zinc complexes based on Schiff base ligands
15
作者 YANG Yuanyu XUE Jianhua +3 位作者 BAI Yujia CUI Lulu YANG Dongdong MA Qi 《无机化学学报》 北大核心 2025年第6期1207-1216,共10页
Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-... Two new complexes,[Zn_(2)(L1)(HL1)(NO_(3))]·CH_(3)OH(1)and[Zn_(3)(L2)(L3)_(3)Cl]·CH_(3)OH(2),were successfully synthesized by‘one-pot’method based on cinnoline-3-ylhydrazine ligand and zinc with 2-hydroxy-4-methoxybenzaldehyde and 2-hydroxy-3-methoxybenzaldehyde ligands,respectively,where H_(2)L1=5-methoxy-2-(phthalazin-1-ylhydrazonomethyl)-phenol,H_(2)L2=2-methoxy-6-(phthalazin-1-yl-hydrazonomethyl)-phenol,HL3=2-(1,8-dihydro-[1,2,4]triazolo[3,4-α]phthalazin-3-yl)-6-methoxy-phenol.Complexes 1 and 2 were characterized by infrared spectroscopy,elemental analysis,single-crystal X-ray diffraction,powder X-ray diffraction,etc.It is worth noting that the cinnolin-3-yl-hydrazine ligand and 2-hydroxy-3-methoxybenzaldehyde form two types of Schiff bases(H_(2)L2 and HL3)when in situ reacting and coordinating with Zn(Ⅱ),and HL3 also has two coordination modes.In addition,the fluorescence performance showed that complex 1 can achieve selective and sensitive sensing of Al^(3+)in water with a detection limit of 6.37μmol·L^(-1).CCDC:2413978,1;2413979,2. 展开更多
关键词 Zn-complex Schiff base FLUORESCENCE Al^(3+)detection
在线阅读 下载PDF
Crystal structure and antibacterial activity of two Gd_(2)complexes based on polydentate Schiff-base ligands
16
作者 ZHANG Yingyue KANG Liuqing +2 位作者 YANG Yating GUAN Xiaofen WANG Wenmin 《无机化学学报》 北大核心 2025年第9期1867-1877,共11页
Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene... Two Gd_(2)complexes,namely[Gd_(2)(dbm)_(2)(HL_(1))_(2)(CH_(3)OH)_(2)]·4CH_(3)OH(1)and[Gd_(2)(dbm)_(2)(L_(2))_(2)(CH_(3)OH)_(2)]·2CH_(3)OH(2),where H_(3)L_(1)=(Z)-N'-[4-(diethylamino)-2-hydroxybenzylidene]-2-hydroxyacetohydrazide,H_(2)L_(2)=(E)-N'-(5-bromo-2-hydroxy-3-methoxybenzylidene)nicotinohydrazide,Hdbm=dibenzoylmethane,have been constructed by adopting the solvothermal method.Structural characterization unveils that both complexes 1 and 2 are constituted by two Gd^(3+)ions,two dbm-ions,two CH_(3)OH molecules,and two polydentate Schiff-base ligands(HL_(1)^(2-)or L_(2)^(2-)).In addition,complex 1 contains four free methanol molecules,whereas complex 2 harbors two free methanol molecules.By investigating the interactions between complexes 1 and 2 and four types of bacteria(Bacillus subtilis,Escherichia coli,Staphylococcus aureus,Candida albicans),it was found that both complexes 1 and 2 exhibited potent antibacte-rial activities.The interaction mechanisms between the ligands H_(3)L_(1),H_(2)L_(2),complexes 1 and 2,and calf thymus DNA(CT-DNA)were studied using ultraviolet-visible spectroscopy,fluorescence titration,and cyclic voltammetry.The results demonstrated that both complexes 1 and 2 can intercalate into CT-DNA molecules,thereby inhibiting bacterial proliferation to achieve the antibacterial effects.CCDC:2401116,1;2401117,2. 展开更多
关键词 Gd_(2)complex polydentate Schiff base crystal structure DNA INTERACTION antibacterial activity
在线阅读 下载PDF
Impact of Information and Communication Technologies Based Initiatives: An Attitudinal Change in Students and Teachers
17
作者 Surya Narayan Gupta Manohar Sah Akhilesh Chaube 《Applied Mathematics》 2025年第2期190-199,共10页
There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered ... There is curiosity and awareness throughout the world regarding the role of Information and Communication technologies. This is felt in each and every section of society. Several studies have confirmed and considered information and communication technology’s significance in the field of education. It has not only affected learners but also to the teachers. This paper explores how ICT-based projects affect teachers’ and students’ attitudes. The data was collected through self-prepared attitude scale. It was distributed among the teachers and students of various schools. Two hundred students and one hundred twenty teachers responded to the questionnaire. Analysis was done through the data collected from the teachers as well as from students. The study’s conclusions demonstrated that while there was no significant variation in the attitudes of teachers utilizing different ICT-based programs, there was a substantial difference in the students’ attitude toward learning with different ICT-based programs. 展开更多
关键词 ICT based Initiatives ICT Teacher’s Attitude Student’s Attitude
在线阅读 下载PDF
Call forpapers SI: Target-based drug screening
18
《Journal of Pharmaceutical Analysis》 2025年第1期F0004-F0004,共1页
Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand... Target-based and phenotype-based methods are the two main approaches for drug screening.Target-based drug screening focuses on specific targets CPA highly correlated with disease mechanisms,by detecting protein-ligand binding structure,dynamics and affinity.Currently,the four mainstream drug targets are G protein-coupled receptors(GPCRs),kinases,ion channels,and nuclear receptors,accounting for over 70%of effective drug targets,most of which are membrane proteins and enzymes.In recent years,various new drug targets have been continuously discovered,and the research focus has shifted from simple affinity analysis to high-throughput and high-content screening,as well as exploring drug-target interaction modes.These deepen reliance on the analytical techniques to have higher sensitivity,recognition specificity,and applicability to diversified target structures,which promoting the rapid development of novel screening methods. 展开更多
关键词 nuclear receptorsaccounting target based drug screening phenotype based methods membrane proteins drug screening drug targets protein ligand binding drug screeningtarget based
暂未订购
A rhombic Dy_(4)-based complex showing remarkable single-molecule magnet behavior
19
作者 HOU Yinling JI Jia +5 位作者 YU Hong BIAN Xiaoyun GUAN Xiaofen QIU Jing REN Shuyi FANG Ming 《无机化学学报》 北大核心 2025年第3期605-612,共8页
A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in... A tetranuclear Ln(Ⅲ)-based complex:[Dy_(4)(dbm)_(4)(L)_(6)(μ_(3)-OH)_(2)]·CH_(3)CN(1)(HL=5-[(4-methylbenzylidene)amino]quinolin-8-ol,Hdbm=dibenzoylmethane)was manufactured and its structure was characterized in detail.Xray diffraction analysis shows that complex 1 belongs to the monoclinic crystal system and its space group is P2_1/n,which contains a rhombic Dy_(4)core.Magnetic measurements of 1 suggest it possesses extraordinary single-molecule magnet(SMM)behavior.Its energy barrier U_(eff)/k_(B)was 116.7 K,and the pre-exponential coefficient τ_(0)=1.05×10~(-8)s.CCDC:2359322. 展开更多
关键词 tetranuclear Dy(Ⅲ)complex Schiff base ligand crystal structure magnetic property single⁃molecule magnet
在线阅读 下载PDF
A Dynamic Knowledge Base Updating Mechanism-Based Retrieval-Augmented Generation Framework for Intelligent Question-and-Answer Systems
20
作者 Yu Li 《Journal of Computer and Communications》 2025年第1期41-58,共18页
In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilizati... In the context of power generation companies, vast amounts of specialized data and expert knowledge have been accumulated. However, challenges such as data silos and fragmented knowledge hinder the effective utilization of this information. This study proposes a novel framework for intelligent Question-and-Answer (Q&A) systems based on Retrieval-Augmented Generation (RAG) to address these issues. The system efficiently acquires domain-specific knowledge by leveraging external databases, including Relational Databases (RDBs) and graph databases, without additional fine-tuning for Large Language Models (LLMs). Crucially, the framework integrates a Dynamic Knowledge Base Updating Mechanism (DKBUM) and a Weighted Context-Aware Similarity (WCAS) method to enhance retrieval accuracy and mitigate inherent limitations of LLMs, such as hallucinations and lack of specialization. Additionally, the proposed DKBUM dynamically adjusts knowledge weights within the database, ensuring that the most recent and relevant information is utilized, while WCAS refines the alignment between queries and knowledge items by enhanced context understanding. Experimental validation demonstrates that the system can generate timely, accurate, and context-sensitive responses, making it a robust solution for managing complex business logic in specialized industries. 展开更多
关键词 Retrieval-Augmented Generation Question-and-Answer Large Language Models Dynamic Knowledge Base Updating Mechanism Weighted Context-Aware Similarity
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部