期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Targeted Lipidomic Signatures of Rat Plasma and Machine Learning-Based Triage Models after Total-Body Gamma Irradiation
1
作者 Cong Xi Tianjing Cai +4 位作者 Xue Lu Xuelei Tian Yizhe Gao Qi Chen Qingjie Liu 《Biomedical and Environmental Sciences》 2025年第12期1564-1568,共5页
In the event of nuclear accidents and incidents,when emergency resources are scarce,rapid and high-throughput biodosimeters for massive population triage and estimation are essential to guide medical treatment.Lymphoc... In the event of nuclear accidents and incidents,when emergency resources are scarce,rapid and high-throughput biodosimeters for massive population triage and estimation are essential to guide medical treatment.Lymphocyte dynamics,chromosome aberration analysis,and micronucleus assays are mainly used to estimate the biological dose of radiation[1].However,these technologies require highly trained personnel to perform and interpret and have the limitations of time consumption and low throughput,underscoring the urgent need for the development of radiation biomarkers and early classification.Dose and temporal responses as well as efficient triage models are important facets of radiation biodosimeters. 展开更多
关键词 massive population triage estimation machine learning total body gamma irradiation triage models guide medical treatmentlymphocyte dynamicschromosome aberration analysisand estimate biological dose radiation howeverthese emergency resources micronucleus assays
暂未订购
Towards secure and fine-grained data sharing over cloud platform
2
作者 Fuyuan SONG Xiaowei SUN +2 位作者 Yunlong GAO Qin JIANG Zhangjie FU 《Frontiers of Computer Science》 2025年第6期147-149,共3页
1 Introduction Access control and key update are crucial for secure data sharing.Currently,many access control strategies have been proposed to address unauthorized access and privacy breaches[1,2].However,these strat... 1 Introduction Access control and key update are crucial for secure data sharing.Currently,many access control strategies have been proposed to address unauthorized access and privacy breaches[1,2].However,these strategies typically focus only on the unilateral access control of data requesters,potentially failing to prevent unauthorized individuals from maliciously publishing data.Additionally,existing key update schemes rely on trusted key generation center(KGC)and have significant performance limitations,which are not practical[3,4]. 展开更多
关键词 unilateral access control unauthorized access privacy breaches howeverthese access control strategies access control trusted key generation center kgc key update secure data sharing cloud platform
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部