期刊文献+
共找到84篇文章
< 1 2 5 >
每页显示 20 50 100
Utility of inflammatory markers as predictors of recurrence in gastrointestinal stromal tumors:Insights from a nomogram-based approach
1
作者 Chris B Lamprecht Tyler Kashuv Brandon Lucke-Wold 《World Journal of Gastrointestinal Oncology》 2025年第9期385-390,共6页
Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate i... Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate immune-inflammatory response,remain poorly understood.This editorial highlights key prognostic factors that impact GIST progression and prognosis,while discussing the findings of a recent study that investigated the prognostic value of systemic inflammatory markers:systemic immune-inflammation index,neutrophil/lym-phocyte ratio,platelet/lymphocyte ratio,and monocyte/lymphocyte ratio,on recurrence-free survival in GIST patients.This editorial examines strategies to enhance the clinical applicability of the nomogram developed in the study,ensuring its effectiveness for robust implementation.Future directions outlined in the editorial stress the importance of integrating molecular insights,including KIT and PDGFRA mutations,tumor staging,and mitotic rates to refine predictive models.The editorial also underscores the value of multi-center studies to enhance the generalizability and clinical relevance of these approaches.By bridging inflammatory biomarkers with genetic and clinicopathologic factors,a more comprehensive understanding of GIST pathophysiology can be developed,paving the way for improved management strategies and patient outcomes.This perspective serves as a call to action for continued research into the interplay between genetic mutations,inflammatory marker modulation,and GIST progression,aiming to expand the scope of personalized oncology through a deeper understanding of GIST progression. 展开更多
关键词 Gastrointestinal stromal tumor Recurrence prediction Nomogram predicative modeling Inflammatory markers Tumor risk factors
暂未订购
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
2
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment
3
作者 Arif Ullah Siti Fatimah Abdul Razak +1 位作者 Sumendra Yogarayan Md Shohel Sayeed 《Computers, Materials & Continua》 2025年第3期5185-5204,共20页
Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves ... Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves resource allocation techniques is host load prediction.This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues,which add several minutes to response times.To solve this issue and accurately predict cloud capacity,cloud data centers use prediction algorithms.This permits dynamic cloud scalability while maintaining superior service quality.For host prediction,we therefore present a hybrid convolutional neural network long with short-term memory model in this work.First,the suggested hybrid model is input is subjected to the vector auto regression technique.The data in many variables that,prior to analysis,has been filtered to eliminate linear interdependencies.After that,the persisting data are processed and sent into the convolutional neural network layer,which gathers intricate details about the utilization of each virtual machine and central processing unit.The next step involves the use of extended short-term memory,which is suitable for representing the temporal information of irregular trends in time series components.The key to the entire process is that we used the most appropriate activation function for this type of model a scaled polynomial constant unit.Cloud systems require accurate prediction due to the increasing degrees of unpredictability in data centers.Because of this,two actual load traces were used in this study’s assessment of the performance.An example of the load trace is in the typical dispersed system.In comparison to CNN,VAR-GRU,VAR-MLP,ARIMA-LSTM,and other models,the experiment results demonstrate that our suggested approach offers state-of-the-art performance with higher accuracy in both datasets. 展开更多
关键词 Cloud computing DATACENTER virtual machine(VM) PREDICATION algorithm
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
4
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Prediction of compressive strength of cement mortars with fly ash and activated coal gangue 被引量:6
5
作者 周双喜 陈益民 张文生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第4期549-552,共4页
The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive st... The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive strength of mortars made with ternary blends of cement, activated coal gangue and fly ash. Based on the results of a minimum of seven design points, three special cubic polynomial models are used to establish the strength predicating equations at different ages for mortars. Five experimental checkpoints were also designed to verify the precision of the equations. The most frequent errors of the predicted values are within 3%. A simple and practical way is provided for determining the optimal proportion of two admixtures when they are used in concrete. 展开更多
关键词 thermal activated coal gangue simplex-centroid design predicating equation compressive strength
在线阅读 下载PDF
A Syntactic Contrast of English and Chinese——Subject-Prominent vs.Topic-Prominent 被引量:1
6
作者 付译婷 《海外英语》 2011年第7X期394-395,共2页
English and Chinese belong to different language families,employing two distinct syntactic systems.English is subject-prominent,following the pattern of subject first,then predicate;while Chinese is topic-prominent,sh... English and Chinese belong to different language families,employing two distinct syntactic systems.English is subject-prominent,following the pattern of subject first,then predicate;while Chinese is topic-prominent,showing much flexibility in word arrangement as well as the necessity of subject and predicate. 展开更多
关键词 TOPIC SUBJECT PREDICATE SYNTAX
在线阅读 下载PDF
英藏“谓语”比较与英文教学中Predicate一词藏译略考
7
作者 阿努 赤列德吉 《海外英语》 2016年第3期177-178,共2页
我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重... 我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重要原因。该文以英文教学为主体,旨在通过对英藏基础句法中"Predicate"一词的直接对比和语法术语的藏译探讨,望能解决农牧区藏族学生英文教学中的理解困扰。 展开更多
关键词 英藏 谓语 比较 教学 PREDICATE 藏译
在线阅读 下载PDF
On the Usage of the Subjunctive Mood in English
8
作者 张晓艳 《海外英语》 2010年第11X期441-443,447,共4页
The subjunctive mood is one of the most difficult English grammar items for most English learners. In this thesis,the author discusses the usage of the subjunctive mood in English,especially its usage in English subor... The subjunctive mood is one of the most difficult English grammar items for most English learners. In this thesis,the author discusses the usage of the subjunctive mood in English,especially its usage in English subordinate clauses. At the same time,the author provides a lot of examples. In the author's opinion,as long as the English learners find out the rules of it and practice it more,they will definitely grasp the subjunctive mood and use it correctly and skillfully. 展开更多
关键词 SUBJUNCTIVE MOOD forms of PREDICATE VERBS SUBORDINATE CLAUSES examples
在线阅读 下载PDF
Modeling Trusted Computing 被引量:3
9
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
在线阅读 下载PDF
Theory of Approximate Reasoning in Two-Valued Predicate Logic Based on the Quasi-truth Degrees 被引量:2
10
作者 秦晓燕 刘军 +2 位作者 徐扬 陈树伟 刘熠 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期23-27,共5页
Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the ... Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the quasi-truth degrees of first-order formulae is discussed, and it is proved that there is no isolated point in the logic metric space (F, ρ ). Thus the pseudo-metric between first-order formulae is well defined to develop the study about approximate reasoning in the logic metric space (F, ρ ). Then, three different types of approximate reasoning patterns are proposed, and their equivalence under some condition is proved. This work aims at filling in the blanks of approximate reasoning in quantitative predicate logic. 展开更多
关键词 approximate reasoning PSEUDO-METRIC quasi-truth degree predicate logic
在线阅读 下载PDF
Predication of Fhhh potential in PTA wastewater treatment 被引量:1
11
作者 CHENGShu-pei SHILei ZHANGXu-xiang YANJun DINGZhong-hai HAOChun-bo 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2004年第1期1-4,共4页
Ebis is the intelligent environmental biotechnological informatics software developed for judging the effectiveness of the microorganism strain in the industrial wastewater treatment system(IWTS) at the optimal status... Ebis is the intelligent environmental biotechnological informatics software developed for judging the effectiveness of the microorganism strain in the industrial wastewater treatment system(IWTS) at the optimal status. The parameter, as the objective function for the judgment, is the minimum reactor volume( V _ min ) calculated by Ebis for microorganism required in wastewater treatment. The rationality and the universality of Ebis were demonstrated in the domestic sewage treatment system(DSTS) with the data published in USA and China at first,then Fhhh strain's potential for treating the purified terephthalic acid(PTA) was proved. It suggests that Ebis would be useful and universal for predicating the technique effectiveness in both DSTS and IWTS. 展开更多
关键词 SOFTWARE STRAIN POTENTIAL PREDICATION purified terephthalic acid wastewater
在线阅读 下载PDF
Viscosity profile prediction of a heavy crude oil during lifting in two deep artesian wells 被引量:1
12
作者 Yibo Li Hao Gao +4 位作者 Wanfen Pu Bing Wei Yafei Chen Dong Li Qiang Luo 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2017年第7期976-982,共7页
It has been known that the productivity of artesian wells is strongly dependent on the rheological properties of crude oils. This work targets two deep artesian wells(>5000 m) that are producing heavy crude oil. Th... It has been known that the productivity of artesian wells is strongly dependent on the rheological properties of crude oils. This work targets two deep artesian wells(>5000 m) that are producing heavy crude oil. The impacts of well conditions including temperature, pressure and shear rate, on the crude oil rheology were comprehensively investigated and correlated using several empirical rheological models. The experimental data indicate that this heavy oil is very sensitive to temperature as result of microstructure change caused by hydrogen bonding. The rheological behavior of the heavy oil is also significantly impacted by the imposed pressure, i.e., the viscosity flow activation energy(Eμ) gently increases with the increasing pressure. The viscosity–shear rate data are well fitted to the power law model at low temperature. However, due to the transition of fluid feature at high temperature(Newtonian fluid), the measured viscosity was found to slightly deviate from the fitting data. Combining the evaluated correlations, the viscosity profile of the heavy crude oil in these two deep artesian wells as a function of well depth was predicted using the oilfield producing data. 展开更多
关键词 Heavy oil Rheological properties Empirical correlation Viscosity profile predication Lifting process Artesian well
在线阅读 下载PDF
Predication of plasma concentration of remifentanil based on Elman neural network 被引量:1
13
作者 汤井田 曹扬 +1 位作者 肖嘉莹 郭曲练 《Journal of Central South University》 SCIE EI CAS 2013年第11期3187-3192,共6页
Due to the nature of ultra-short-acting opioid remifentanil of high time-varying,complex compartment model and low-accuracy of plasma concentration prediction,the traditional estimation method of population pharmacoki... Due to the nature of ultra-short-acting opioid remifentanil of high time-varying,complex compartment model and low-accuracy of plasma concentration prediction,the traditional estimation method of population pharmacokinetics parameters,nonlinear mixed effects model(NONMEM),has the abuses of tedious work and plenty of man-made jamming factors.The Elman feedback neural network was built.The relationships between the patients’plasma concentration of remifentanil and time,patient’age,gender,lean body mass,height,body surface area,sampling time,total dose,and injection rate through network training were obtained to predict the plasma concentration of remifentanil,and after that,it was compared with the results of NONMEM algorithm.In conclusion,the average error of Elman network is 6.34%,while that of NONMEM is 18.99%.The absolute average error of Elman network is 27.07%,while that of NONMEM is 38.09%.The experimental results indicate that Elman neural network could predict the plasma concentration of remifentanil rapidly and stably,with high accuracy and low error.For the characteristics of simple principle and fast computing speed,this method is suitable to data analysis of short-acting anesthesia drug population pharmacokinetic and pharmacodynamics. 展开更多
关键词 Elman neural network REMIFENTANIL plasma concentration predication model
暂未订购
Semantic Description and Verification of Security Policy Based on Ontology 被引量:1
14
作者 TANG Chenghua WANG Lina +2 位作者 TANG Shensheng QIANG Baohua TIAN Jilong 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期385-392,共8页
To solve the shortage problem of the semantic descrip- tion scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By de... To solve the shortage problem of the semantic descrip- tion scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By defining the basic elements of the security policy, the relationship model between the ontology and the concept of security policy based on the Web ontology language (OWL) is established, so as to construct the semantic description framework of the security policy. Through modeling and reasoning in the Protege, the ontology model of authorization policy is proposed, and the first-order predicate description logic is introduced to the analysis and verification of the model. Results show that the ontology-based semantic description of security policy has better flexibility and practicality. 展开更多
关键词 security policy ONTOLOGY semantic description ofpolicy the first-order predicate description logic
原文传递
Predicate Oriented Pattern Analysis for Biomedical Knowledge Discovery 被引量:2
15
作者 Feichen Shen Hongfang Liu +2 位作者 Sunghwan Sohn David W. Larson Yugyung Lee 《Intelligent Information Management》 2016年第3期66-85,共20页
In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF... In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF, OWL). With the increasing number of semi-structured data coming into the biomedical community, data integration and knowledge discovery from heterogeneous domains become important research problem. In the application level, detection of related concepts among medical ontologies is an important goal of life science research. It is more crucial to figure out how different concepts are related within a single ontology or across multiple ontologies by analysing predicates in different knowledge bases. However, the world today is one of information explosion, and it is extremely difficult for biomedical researchers to find existing or potential predicates to perform linking among cross domain concepts without any support from schema pattern analysis. Therefore, there is a need for a mechanism to do predicate oriented pattern analysis to partition heterogeneous ontologies into closer small topics and do query generation to discover cross domain knowledge from each topic. In this paper, we present such a model that predicates oriented pattern analysis based on their close relationship and generates a similarity matrix. Based on this similarity matrix, we apply an innovated unsupervised learning algorithm to partition large data sets into smaller and closer topics and generate meaningful queries to fully discover knowledge over a set of interlinked data sources. We have implemented a prototype system named BmQGen and evaluate the proposed model with colorectal surgical cohort from the Mayo Clinic. 展开更多
关键词 Biomedical Knowledge Discovery Pattern Analysis PREDICATE Query Generation
在线阅读 下载PDF
A Contrastive Analysis of Subject and Predicate in English and Chinese
16
作者 张晰 《海外英语》 2013年第15期263-264,275,共3页
Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English ... Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English and Chinese,focusing on differences of subject and predicate usages in the two languages,and the problems they cause for Chinese students in English learning and translation. 展开更多
关键词 ENGLISH CHINESE SUBJECT PREDICATE DIFFERENCES
在线阅读 下载PDF
Location Prediction of Blind Ore bodies in Shuijingtun Gold Mine, Zhangjiakou, China
17
作者 WEI Jun-hao LIU Cong-qiang +1 位作者 ZHAO Zhi-qi LI Jian-wei 《Journal of Central South University》 SCIE EI CAS 2000年第3期124-128,共5页
By analyzing the metallogenic conditions and prospecting marks of F 8 fault belt in Shiujingtun Gold Mine, the geochemical samples were collected along F 8 fault belt and prospecting profile normal to the F 8 fault be... By analyzing the metallogenic conditions and prospecting marks of F 8 fault belt in Shiujingtun Gold Mine, the geochemical samples were collected along F 8 fault belt and prospecting profile normal to the F 8 fault belt. Gold and its indicator elements were tested with X ray fluorescence spectrometry and the content distribution diagram of Au, Ag, Hg and As along the F 8 fault belt was performed. The geochemical primary halo model and the Grey system model of F 8 fault belt are established. With these element distribution features and models, the blind ore bodies in the F 8 fault belt were predicted. Engineering prospect shows that the industrial orebodies have been discovered and the prediction results are dependable. 展开更多
关键词 location PREDICATION BLIND ORE BODIES geochemical primary HALO grey system model
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部