期刊文献+
共找到907篇文章
< 1 2 46 >
每页显示 20 50 100
Systemic Activation of Defensive Enzymes and Protection in Tobacco Plantlets against <i>Phytophthora nicotianae</i>Induced by Oligosaccharins
1
作者 Alejandro Bernardo Falcón-Rodríguez Daimy Costales +2 位作者 Juan Carlos Cabrera Ruddy Wattiez Miguel ángel Martínez-Téllez 《American Journal of Plant Sciences》 2014年第21期3354-3363,共10页
Oligosaccharins are potent biomolecules which activate defense responses and resistance in tobacco plants. However, it is not known the systemic behavior of defensive enzymes activated by these elicitors. In this work... Oligosaccharins are potent biomolecules which activate defense responses and resistance in tobacco plants. However, it is not known the systemic behavior of defensive enzymes activated by these elicitors. In this work, the dynamic behavior of key defensive enzymes was evaluated in tobacco plant leaves previously treated through the roots with chitosan polymer (CH), chitosan (COS) and pectic (OGAS) oligosaccharides and Spermine (Sp). All macromolecules tested activated protein levels and defense enzymatic activity in tobacco leaves but with different response dynamics among them and depending on the biochemical variable evaluated. Defense response above control levels were detected since 12 hours after treatments and it consisted in a biphasic behavior with two peaks for PAL (EC 4.3.1.5) and β 1 - 3 glucanase (EC 3.2.1.6) enzymatic activities. The highest enzymatic levels for these enzymes were achieved at 48 hours in plantlets elicited with COS and at 72 hours for those plants treated with chitosan polymer, while the highest POD (EC 1.11.1.6) activity was detected with CH between 48 and 72 hours. These results demonstrated systemic defense activation by oligosaccharins in tobacco whose dynamic of defense response is affected by the kind of oligosaccharins tested. When applying OGAS by foliar spray on tobacco, systemic resistance against Phytoththora nicotianae was induced and plantlets were protected with the low concentration tested by 46% under the bioassays conditions performed. Moreover, enzymatic determinations on roots and leaves previous to plant-pathogen interaction showed increments above 30% of control levels for PAL and POD activities. It means that oligosaccharins activate local and systemic defense responses in plants in the absent of pathogen infection. 展开更多
关键词 systemIC INDUCED Resistance Oligosaccharins TOBACCO defensive Enzymes
暂未订购
Exogenous melatonin enhances heat stress tolerance in sweetpotato by modulating antioxidant defense system,osmotic homeostasis and stomatal traits 被引量:1
2
作者 Sunjeet Kumar Rui Yu +5 位作者 Yang Liu Yi Liu Mohammad Nauman Khan Yonghua Liu Mengzhao Wang Guopeng Zhu 《Horticultural Plant Journal》 2025年第1期431-445,共15页
Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairme... Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairments is essential for the long-term production of sweetpotatoes.Melatonin has been recognised for its capacity to assist plants in dealing with abiotic stress conditions.This research aimed to investigate how different doses of exogenous melatonin influence heat damage in sweetpotato plants.Heat stress drastically affected shoot and root fresh weight by 31.8 and 44.5%,respectively.This reduction resulted in oxidative stress characterised by increased formation of hydrogen peroxide(H_(2)O_(2))by 804.4%,superoxide ion(O_(2)^(·-))by 211.5%and malondialdehyde(MDA)by 234.2%.Heat stress also reduced chlorophyll concentration,photosystemⅡefficiency(F_v/F_m)by 15.3%and gaseous exchange.However,pre-treatment with 100μmol L^(-1)melatonin increased growth and reduced oxidative damage to sweetpotato plants under heat stress.In particular,melatonin decreased H_(2)O_(2),O_(2)^(·-)and MDA by 64.8%,42.7%and 38.2%,respectively.Melatonin also mitigated the decline in chlorophyll levels and improved stomatal traits,gaseous exchange and F_(v)/F_(m)(13%).Results suggested that the favorable outcomes of melatonin treatment can be associated with elevated antioxidant enzyme activity and an increase in non-enzymatic antioxidants and osmo-protectants.Overall,these findings indicate that exogenous melatonin can improve heat stress tolerance in sweetpotatoes.This stu dy will assist re searchers in further investigating how melatonin makes sweetpotatoes more resistant to heat stress. 展开更多
关键词 SWEETPOTATO Heat stress MELATONIN Oxidative damage Antioxidant defense system Stomatal traits
在线阅读 下载PDF
Cooperative guidance law against active defensive aircraft in two-on-two engagement
3
作者 WANG Xintao YANG Ming +2 位作者 HOU Mingzhe WANG Songyan CHAO Tao 《Journal of Systems Engineering and Electronics》 2025年第6期1629-1644,共16页
A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a... A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a target,based on fixed-time sliding mode control theory.Based on the nonlinear method of fixed-time sliding mode control,the performance of the cooperative guidance law remains satisfactory even with large-heading-errors scenarios where the linearization-based approaches might be invalid.By virtue of this law,the attacker pursues the target with the assistance of the protector,which can intercept the defender in the engagement scenario.Furthermore,if the attacker is intercepted by the defender,the guidance law of the protector could guarantee that the protector attacks the target.A robust adaptive term is included in the guidance law to deal with the case of the unknown disturbance upper bound of the defender-target team.Finally,the feasibility of the guidance law is verified by nonlinear numerical simulations,and the superiority of it is illustrated by comparing with the linearization guidance law. 展开更多
关键词 cooperative guidance adaptive control fixed-time sliding mode control two-on-two engagement active defensive
在线阅读 下载PDF
Defensive antibacterial coating in orthopaedic surgery: Current evidence and future direction
4
作者 Richard Henry Randall Roberts Charles Gamble Ibrahim Malek 《World Journal of Orthopedics》 2025年第7期29-36,共8页
Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising stra... Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising strategy to combat these infections.It forms a biodegradable barrier that reduces bacterial adhesion and can deliver local antibiotics,thereby addressing a key mechanism in biofilm formation.Early clinical evidence suggests that DAC®effectively lowers infection recurrence in revision hip and knee arthroplasties,with additional benefits in trauma procedures and soft tissue repairs.Moreover,it has demonstrated compat-ibility with existing implants and surgical techniques,while potentially reducing overall antibiotic use and hospital stays.Despite these encouraging findings,data for its use in primary arthroplasty remains limited,underscoring the need for large-scale,high-quality studies.Future research is poised to refine DAC®’s antimicrobial efficacy through novel antibiotic combinations,personalised delivery systems,and broader applications beyond lower limb procedures.As the prevalence of comorbidities continues to rise,DAC®represents a valuable addi-tion to multifaceted infection control protocols,potentially transforming ortho-paedic care by enhancing patient outcomes and mitigating the economic and clinical burden of implant-related infections. 展开更多
关键词 Hospital-acquired infections Surgical site infections Periprosthetic joint infections Implant-related infections Orthopaedic surgery Antibiotic prophylaxis defensive antibacterial coating Biofilm prevention Revision arthroplasty Patient outcomes
暂未订购
Damage of Snowstorm Weather and Defensive Measures in Tongliao Area
5
作者 Yingcai GUO 《Meteorological and Environmental Research》 2025年第4期26-28,共3页
The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mong... The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mongolian low vortex is the main weather system that triggers snowstorms,and can be classified into three types:small trough development,horizontal trough becoming vertical,and low trough moving eastwards.Snowstorms pose a relatively serious threat to agricultural and animal husbandry production,transportation,power and communication in Tongliao.Especially in spring,snowstorm weather poses a greater threat to agriculture and animal husbandry in Tongliao.It is needed to pay attention to the impact of extreme weather and climate events such as snowstorms,strengthen research on the mechanisms of disaster-causing weather,enhance the early warning capability of disasters,and provide good service guarantees for low-temperature weather in winter. 展开更多
关键词 SNOWSTORM Occurrence characteristics HARM defensive measures
在线阅读 下载PDF
Large Prey Growth in the Wolkowicz-Rothe-Shafer Predator-Prey System with Group Defense
6
作者 André ZEGELING LIAO Jin 《数学理论与应用》 2025年第3期1-52,共52页
This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey... This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey growth,the system reduces to a perturbed singular system,whose limit cycles can be analyzed using geometric singular perturbation methods-primarily through the study of a slow-divergence integral.Our work completes partially the results previously obtained by Li and Zhu and by Hsu.We provide a comprehensive classification of all possible singular cycles capable of generating limit cycles and analyze the slow-divergence integral for the nine distinct types of cycle families that arise in a canard explosion.Based on these findings,we demonstrate that the maximum number of limit cycles emerging from the singular cycles is two in all cases,thereby confirming conjectures posed by Rothe-Shafer and Xiao-Ruan. 展开更多
关键词 Predator-prey system Group defense Singular perturbation Limit cycle
在线阅读 下载PDF
A Mini Review on Plant Immune System Dynamics:Modern Insights into Biotic and Abiotic Stress
7
作者 Malini Ray Sanchari Burman Shweta Meshram 《Phyton-International Journal of Experimental Botany》 2025年第8期2285-2312,共28页
Plants are under constant exposure to varied biotic and abiotic stresses,which significantly affect their growth,productivity,and survival.Biotic stress,caused by pathogens,and abiotic stress,including drought,salinit... Plants are under constant exposure to varied biotic and abiotic stresses,which significantly affect their growth,productivity,and survival.Biotic stress,caused by pathogens,and abiotic stress,including drought,salinity,extreme temperatures,and heavy metals,activate overlapping yet distinct immune pathways.These are comprised of morphological barriers,hormonal signaling,and the induction of stress-responsive genes through complex pathways mediated by reactive oxygen species(ROS),phytohormones,and secondary metabolites.Abiotic stress triggers organelle-mediated retrograde signaling from organelles like chloroplasts and mitochondria,which causes unfolded protein responses and the regulation of cellular homeostasis.Simultaneously,biotic stress activates both PAMP-triggered immunity(PTI)and effector-triggered immunity(ETI),mediated by salicylic acid(SA),jasmonic acid(JA),and ethylene(ET).This review aims to provide an integrated overview of plant immune responses tomultiple stressors,with emphasis on molecular crosstalk and recent technological interventions.A systematic literature search was conducted using the Scopus database,covering studies published between 2010 and 2025.Advances in CRISPR-Cas genome editing,RNA interference,omics technologies,nanotechnology,and artificial intelligence have improved our knowledge of plant stress physiology and facilitated the design of resilient crop varieties.Despite these advances,the integration of immune signals under simultaneous biotic and abiotic stress remains poorly understood,particularly at tissue-specific and cellular levels.Additionally,practical challenges persist in delivery methods,regulatory hurdles,and long-term field validation.With the escalation of climate change,understanding the complex crosstalk between stress signalling pathways is essential formaintaining sustainable agriculture and global food security.Future directions point toward real-time monitoring tools,such as single-cell omics and spatial transcriptomics,to fine-tune immune responses and support precision crop improvement. 展开更多
关键词 Plant stress responses defense mechanisms signaling pathways biotic stress abiotic stress sustainable agriculture
在线阅读 下载PDF
Security Defenses for Cross-Technology Communication in IoT Control System
8
作者 LI Tianyun ZHANG Anqi ZHANG Guanglin 《Journal of Donghua University(English Edition)》 2025年第5期503-512,共10页
To solve security problems in cross-technology communication(CTC),we take the Internet of Things(IoT)control system as an example,and propose a comprehensive solution against the attack on the physical layer CTC from ... To solve security problems in cross-technology communication(CTC),we take the Internet of Things(IoT)control system as an example,and propose a comprehensive solution against the attack on the physical layer CTC from ZigBee to Wi-Fi.Specifically,we propose a noise interference strategy by adding an appropriate amount of dedicated noise signals,which can interfere with the eavesdropping and simulation of ZigBee signals without affecting the reception of the receiver.Moreover,we also propose a regression modeling strategy which collects data,extracts features,and trains a binary logistic regression model so that the receiver can actively distinguish simulated attack signals.We build the experimental platform by using GNU Radio and USRP devices.Experimental results demonstrate that the security defense strategies can identify and distinguish the signals from the attacker with a high accuracy,effectively solving the signal emulation attack on the physical layer CTC from ZigBee to Wi-Fi. 展开更多
关键词 cross-technology communication Internet of Things(IoT) intelligent control security defense strategy
在线阅读 下载PDF
Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks:A Multi-Stage Attack-Defense Game Approach
9
作者 Dajun Du Yi Zhang +1 位作者 Baoyue Xu Minrui Fei 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期821-823,共3页
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de... Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels. 展开更多
关键词 designing defense strategy networked control systems ncss alterations energy networked control systems false data injection attacks fdias strategywhile false data injection attacks optimal secure control identifying attack strategymaintaining
在线阅读 下载PDF
Analysis of Meteorological Conditions of Freeze Damage to Citrus in Southern Shaanxi in the Winter of 2010 and Defensive Countermeasures 被引量:4
10
作者 柏秦凤 王景红 +3 位作者 霍治国 梁轶 张维敏 郭民主 《Agricultural Science & Technology》 CAS 2013年第3期444-449,共6页
In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investig... In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investigation of freeze dam- age to citrus occurring in Southern Shaanxi in the winter of 2010, the climatic back- ground for the formation of this freeze damage was analyzed. In combination with the freeze damage indicators during the overwintering period and the harmful accu- mulated cold during the cold wave, indexes for grading the freeze damage in southern Shaanxi were analyzed and verified, and the perspective of grading the freeze damage using the harmful accumulated cold during the cold wave was also presented. Through analyzing the extremely lowest temperature and the harmful ac- cumulated cold in the winter of 2010 and in history at 12 citrus growing counties (districts) in Ankang area and Hanzhong area, the reasons why the freeze damage to citrus during the overwintering period was severer in the west than in the east of Southern Shaanxi were discussed, and the results obtained were basically consistent with the actual situation observed from investigation. Finally, defensive countermea- sures against the freeze damage to citrus during the overwintering period were put forward from several aspects. 展开更多
关键词 CITRUS Southern Shaanxi Freeze damage during the overwintering peri- od Meteorological conditions defensive countermeasures
在线阅读 下载PDF
OPTIMIZATION FOR COMBAT CONFIGURATION OF AIR DEFENSE WEAPON SYSTEMS 被引量:3
11
作者 韩松臣 王兴贵 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2000年第1期48-52,共5页
At evaluating the combat effectiveness of the defense system, target′s probability to penetrate the defended area is a primary care taking index. In this paper, stochastic model to compete the probability that targe... At evaluating the combat effectiveness of the defense system, target′s probability to penetrate the defended area is a primary care taking index. In this paper, stochastic model to compete the probability that target penetrates the defended area along any flight path is established by the state analysis and statistical equilibrium analysis of stochastic service system theory. The simulated annealing algorithm is an enlightening random search method based on Monte Carlo recursion, and it can find global optimal solution by simulating annealing process. Combining stochastic model to compete the probability and simulated annealing algorithm, this paper establishes the method to solve problem quantitatively about combat configuration optimization of weapon systems. The calculated result shows that the perfect configuration for fire cells of the weapon is fast found by using this method, and this quantificational method for combat configuration is faster and more scientific than previous one based on principle via map fire field. 展开更多
关键词 air defense missile effectiveness analysis combat configuration simulated annealing algorithm stochastic service system
在线阅读 下载PDF
Effects of Spores and Crude Toxins of Helminthosporium gramineum Rabenh f.sp.echinochloae on the Activity of Defensive Enzymes in Barnyardgrass 被引量:1
12
作者 耿锐梅 余柳青 +3 位作者 罗成刚 李彦东 曹长代 《Agricultural Science & Technology》 CAS 2012年第12期2589-2593,共5页
[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-... [Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process. 展开更多
关键词 Helminthosporium gramineum Rabenh f. sp. echinochloae (HGE) barn- yardgrass[Echinochloa crus-galli(L.) Beauv.] defensive enzymes Activity
在线阅读 下载PDF
Robust Recommendation Adversarial Training Based on Self-Purification Data Sanitization
13
作者 Haiyan Long Gang Chen Hai Chen 《Computers, Materials & Continua》 2026年第4期840-859,共20页
The performance of deep recommendation models degrades significantly under data poisoning attacks.While adversarial training methods such as Vulnerability-Aware Training(VAT)enhance robustness by injecting perturbatio... The performance of deep recommendation models degrades significantly under data poisoning attacks.While adversarial training methods such as Vulnerability-Aware Training(VAT)enhance robustness by injecting perturbations into embeddings,they remain limited by coarse-grained noise and a static defense strategy,leaving models susceptible to adaptive attacks.This study proposes a novel framework,Self-Purification Data Sanitization(SPD),which integrates vulnerability-aware adversarial training with dynamic label correction.Specifically,SPD first identifies high-risk users through a fragility scoring mechanism,then applies self-purification by replacing suspicious interactions with model-predicted high-confidence labels during training.This closed-loop process continuously sanitizes the training data and breaks the protection ceiling of conventional adversarial training.Experiments demonstrate that SPD significantly improves the robustness of both Matrix Factorization(MF)and LightGCN models against various poisoning attacks.We show that SPD effectively suppresses malicious gradient propagation and maintains recommendation accuracy.Evaluations on Gowalla and Yelp2018 confirmthat SPD-trainedmodels withstandmultiple attack strategies—including Random,Bandwagon,DP,and Rev attacks—while preserving performance. 展开更多
关键词 ROBUSTNESS adversarial defense recommendation system poisoning attack SELF-PURIFICATION
在线阅读 下载PDF
Mechanical stress induces molecular changes in oolong tea:Insights from multi-omics analysis
14
作者 Zhilong Hao Yuping Zhang +9 位作者 Weiyi Kong Jiao Feng Yucheng Zheng Hongzheng Lin Xiaomin Yu Yun Sun Xiangxiang Huang Wei Wang Yang Wu Xinyi Jin 《Journal of Integrative Agriculture》 2026年第1期352-365,共14页
Understanding the molecular responses of tea leaves to mechanical stress is crucial for elucidating the mechanisms of post-harvest quality formation during oolong tea processing.This study employed an integrated multi... Understanding the molecular responses of tea leaves to mechanical stress is crucial for elucidating the mechanisms of post-harvest quality formation during oolong tea processing.This study employed an integrated multi-omics strategy to characterize the changes and interactions among metabolomic(MB),transcriptomic(TX),and proteomic(PT)profiles in mechanically stressed tea leaves.Mechanical stress initially activated damage-associated molecular patterns(DAMPs),including Ca^(2+)signaling,jasmonic acid signaling,and glutathione metabolism pathways.These processes subsequently induced quality-related metabolic pathways(QRMPs),particularly α-linolenic acid and phenylalanine metabolism.Upregulated expression of LOX,ADH1,and PAR genes,together with the increased abundance of their encoded proteins,respectively promoted the accumulation of jasmine lactone,benzyl alcohol,and 2-phenylethanol.These findings indicate that mechanical stress influences the metabolite biosynthesis in tea leaves through coordinated molecular responses.This study provides new insights into the molecular mechanisms underlying tea leaf responses to mechanical stress and a foundation for future investigations into how early molecular events may contribute to post-harvest metabolic changes during oolong tea processing. 展开更多
关键词 oolong tea multi-omics mechanical stress defense response α-linolenic acid metabolism phenylalanine metabolism
在线阅读 下载PDF
Essential juniperoil-induced resistance of juniper against Diplodia tip blight in Pinus sylvestris var.mongolica
15
作者 Aomen He Shixian Liao +3 位作者 Jing Guo Teng Ma Xiaowei Chen Boru Zhou 《Journal of Forestry Research》 2026年第2期275-289,共15页
Diplodia tip blight,caused by Diplodia sapinea,is a global pine necrotic disease causing heavy economic losses to the pine industry.Chemical control,its main current management,easily induces pathogen resistance and e... Diplodia tip blight,caused by Diplodia sapinea,is a global pine necrotic disease causing heavy economic losses to the pine industry.Chemical control,its main current management,easily induces pathogen resistance and environmental pollution,which biological control avoids.This study investigated juniper essential oil’s efficacy against the disease on Mongolian Scots pine(Pinus sylvestris var.mongolica)and its induced resistance mechanisms via pot experiments,physiological assays(defense enzyme activities,resistant substances)and metabolomic sequencing(secondary metabolites).Results showed varied efficacy:three foliar sprays of 10μL mL^(-1) oil achieved the best control phenylalanine ammonia-lyase(PAL),polyphenol oxidase(82.9%).The 20μL mL^(-1) treatment significantly increased(PPO)activities,and contents of lignin,flavonoids and total phenolics.Metabolomic analysis showed 326 upregulated and 527 downregulated different metabolites in essential oilinduced and pathogen-inoculated pines,compared to 483 upregulated and 277 downregulated metabolites in noninduced but inoculated pines.The differentially expressed metabolites in treated pines were primarily enriched in pathways related to amino acid metabolism and plant secondary metabolite biosynthesis,with notably increased expression levels of ferulic acid,scopoletin,pipecolic acid,D-proline,and DL-arginine.Therefore,juniper essential oil protects against D.sapinea by inducing systemic acquired resistance in Mongolian Scots pine.In conclusion,juniper essential oil controls D.sapinea by inducing systemic acquired resistance(SAR)in Mongolian Scots pine,clarifying the molecular mechanism and supporting biological control of the disease. 展开更多
关键词 Diplodia tip blight Biological control Induced resistance Metabolomics Plant defense compounds
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
16
《Journal of Systems Engineering and Electronics》 2026年第1期F0003-F0003,共1页
Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest develop ments and achievements in both theoretical and pr... Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest develop ments and achievements in both theoretical and practical aspects of systems engineering,electronics and related research areas.The journalwelcones high quality original papersfrom a wide range of countries The soope of the journal includes systems engineering military systems,electronic technology,defense eleo tronic technology,control theory and practice,soft-ware algorithm and simulation,reliability,computer development and application,and other topics in all related fields. 展开更多
关键词 control theory science technology electronic technology defense electronic technology systems engineering ELECTRONICS military systems systems engineeringelectronics
在线阅读 下载PDF
A Year of Solid Progress,A New Chapter Ahead
17
作者 《China Today》 2026年第2期16-19,共4页
Chinese President Xi Jinping’s New Year message summarized an important year of steady progress as the country prepares to launch its 15th Five-Year Plan.“Our economic strength,scientific and technological abilities... Chinese President Xi Jinping’s New Year message summarized an important year of steady progress as the country prepares to launch its 15th Five-Year Plan.“Our economic strength,scientific and technological abilities,defense capabilities,and composite national strength all reached new heights.”declared President Xi Jinping in his 2026 New Year message on De-By CHINA TODAY cember 31,2025,offering a succinct summary of China’s development over the past year,marked by resilience,progress,and renewed confidence as the country stands at the threshold of a new development phase. 展开更多
关键词 composite national strength CONFIDENCE PROGRESS economic strength five year plan scientific technological abilities resilience defense capabilities
在线阅读 下载PDF
Secured-FL:Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models
18
作者 Bello Musa Yakubu Nor Shahida Mohd Jamail +1 位作者 Rabia Latif Seemab Latif 《Computers, Materials & Continua》 2026年第3期734-757,共24页
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr... Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments. 展开更多
关键词 Federated learning(FL) blockchain FL based privacy model defense FL model security ethereum smart contract
在线阅读 下载PDF
A State-of-the-Art Survey of Adversarial Reinforcement Learning for IoT Intrusion Detection
19
作者 Qasem Abu Al-Haija Shahad Al Tamimi 《Computers, Materials & Continua》 2026年第4期26-94,共69页
Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Tr... Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation. 展开更多
关键词 Reinforcement learning network intrusion detection adversarial training deep learning cybersecurity defense intrusion detection system and machine learning
在线阅读 下载PDF
Prompt Injection Attacks on Large Language Models:A Survey of Attack Methods,Root Causes,and Defense Strategies
20
作者 Tongcheng Geng Zhiyuan Xu +1 位作者 Yubin Qu W.Eric Wong 《Computers, Materials & Continua》 2026年第4期134-185,共52页
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man... Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs. 展开更多
关键词 Prompt injection attacks large language models defense mechanisms security evaluation
在线阅读 下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部