期刊文献+
共找到541,654篇文章
< 1 2 250 >
每页显示 20 50 100
Cross-Domain Time Synchronization in Software-Defined Time-Sensitive Networking
1
作者 Zhang Xiaodong Shou Guochu +2 位作者 Li Hongxing Liu Yaqiong Hu Yihong 《China Communications》 2025年第9期289-306,共18页
The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in... The rise of time-sensitive applications with broad geographical scope drives the development of time-sensitive networking(TSN)from intra-domain to inter-domain to ensure overall end-to-end connectivity requirements in heterogeneous deployments.When multiple TSN networks interconnect over non-TSN networks,all devices in the network need to be syn-chronized by sharing a uniform time reference.How-ever,most non-TSN networks are best-effort.Path delay asymmetry and random noise accumulation can introduce unpredictable time errors during end-to-end time synchronization.These factors can degrade syn-chronization performance.Therefore,cross-domain time synchronization becomes a challenging issue for multiple TSN networks interconnected by non-TSN networks.This paper presents a cross-domain time synchronization scheme that follows the software-defined TSN(SD-TSN)paradigm.It utilizes a com-bined control plane constructed by a coordinate con-troller and a domain controller for centralized control and management of cross-domain time synchroniza-tion.The general operation flow of the cross-domain time synchronization process is designed.The mecha-nism of cross-domain time synchronization is revealed by introducing a synchronization model and an error compensation method.A TSN cross-domain proto-type testbed is constructed for verification.Results show that the scheme can achieve end-to-end high-precision time synchronization with accuracy and sta-bility. 展开更多
关键词 cross-domain time synchronization de-terministic communications error compensation software-defined networking(SDN) time-sensitive networking(TSN)
在线阅读 下载PDF
Predictive Scheme for Mixed Transmission in Time-Sensitive Networking
2
作者 LI Zonghui YANG Siqi +2 位作者 YU Jinghai HE Fei SHI Qingjiang 《ZTE Communications》 2022年第4期78-88,共11页
Time-sensitive networking(TSN)is an important research area for updating the infrastructure of industrial Internet of Things.As a product of the integration of the operation technology(OT)and the information technolog... Time-sensitive networking(TSN)is an important research area for updating the infrastructure of industrial Internet of Things.As a product of the integration of the operation technology(OT)and the information technology(IT),it meets the real-time and deterministic nature of industrial control and is compatible with Ethernet to support the mixed transmission of industrial control data and Ethernet data.This paper systematically summarizes and analyzes the shortcomings of the current mixed transmission technologies of the bursty flows and the periodic flows.To conquer these shortages,we propose a predictive mixed-transmission scheme of the bursty flows and the periodic flows.The core idea is to use the predictability of timetriggered transmission of TSN to further reduce bandwidth loss of the previous mixed-transmission methods.This paper formalizes the probabilistic model of the predictive mixed transmission mechanism and proves that the proposed mecha⁃nism can effectively reduce the loss of bandwidth.Finally,based on the formalized probabilistic model,we simulate the bandwidth loss of the proposed mechanism.The results demonstrate that compared with the previous mixed-transmission method,the bandwidth loss of the pro⁃posed mechanism achieves a 79.48%reduction on average. 展开更多
关键词 time-sensitive networking 802.1Qbv 802.1Qbu guard band strategy preemption strategy
在线阅读 下载PDF
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
3
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
DR-IS:Dynamic Response Incremental Scheduling in Time-Sensitive Network
4
作者 Pei Jinchuan Hu Yuxiang +1 位作者 Tian Le Li Ziyong 《China Communications》 SCIE CSCD 2024年第10期28-42,共15页
Time-Sensitive Network(TSN)with deterministic transmission capability is increasingly used in many emerging fields.It mainly guarantees the Quality of Service(QoS)of applications with strict requirements on time and s... Time-Sensitive Network(TSN)with deterministic transmission capability is increasingly used in many emerging fields.It mainly guarantees the Quality of Service(QoS)of applications with strict requirements on time and security.One of the core features of TSN is traffic scheduling with bounded low delay in the network.However,traffic scheduling schemes in TSN are usually synthesized offline and lack dynamism.To implement incremental scheduling of newly arrived traffic in TSN,we propose a Dynamic Response Incremental Scheduling(DR-IS)method for time-sensitive traffic and deploy it on a software-defined time-sensitive network architecture.Under the premise of meeting the traffic scheduling requirements,we adopt two modes,traffic shift and traffic exchange,to dynamically adjust the time slot injection position of the traffic in the original scheme,and determine the sending offset time of the new timesensitive traffic to minimize the global traffic transmission jitter.The evaluation results show that DRIS method can effectively control the large increase of traffic transmission jitter in incremental scheduling without affecting the transmission delay,thus realizing the dynamic incremental scheduling of time-sensitive traffic in TSN. 展开更多
关键词 incremental scheduling time-sensitive network traffic scheduling transmission jitter
在线阅读 下载PDF
Curvularin derivatives from hydrothermal vent sediment fungus Penicillium sp.HL-50 guided by molecular networking and their antiinflammatory activity 被引量:1
5
作者 Chunxue Yu Zixuan Xia +6 位作者 Zhipeng Xu Xiyang Tang Wenjuan Ding Jihua Wei Danmei Tian Bin Wu Jinshan Tang 《Chinese Journal of Natural Medicines》 2025年第1期119-128,共10页
Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid ... Guided by molecular networking,nine novel curvularin derivatives(1-9)and 16 known analogs(10-25)were isolated from the hydrothermal vent sediment fungus Penicillium sp.HL-50.Notably,compounds 5-7 represented a hybrid of curvularin and purine.The structures and absolute configurations of compounds 1-9 were elucidated via nuclear magnetic resonance(NMR)spectroscopy,X-ray diffraction,electronic circular dichroism(ECD)calculations,^(13)C NMR calculation,modified Mosher's method,and chemical derivatization.Investigation of anti-inflammatory activities revealed that compounds 7-9,11,12,14,15,and 18 exhibited significant suppressive effects against lipopolysaccharide(LPS)-induced nitric oxide(NO)production in murine macrophage RAW264.7 cells,with IC_(50)values ranging from 0.44 to 4.40μmol·L^(-1).Furthermore,these bioactive compounds were found to suppress the expression of inflammation-related proteins,including inducible NO synthase(i NOS),cyclooxygenase-2(COX-2),NLR family pyrin domain-containing protein 3(NLRP3),and nuclear factor kappa-B(NF-κB).Additional studies demonstrated that the novel compound 7 possessed potent antiinflammatory activity by inhibiting the transcription of inflammation-related genes,downregulating the expression of inflammation-related proteins,and inhibiting the release of inflammatory cytokines,indicating its potential application in the treatment of inflammatory diseases. 展开更多
关键词 Penicillium sp.HL-50 Curvularin derivatives Molecular networking Anti-inflammatory activity
原文传递
Call for Papers─Feature Topic Vol.23,No.1,2026 Space-Terrestrial Integrated 6G Network:Architecture,Networking,and Transmission Technologies
6
《China Communications》 2025年第6期F0003-F0003,共1页
With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of hig... With the large-scale deployment of satellite constellations such as Starlink and the rapid advancement of technologies including artificial intelligence (AI) and non-terrestrial networks (NTNs), the integration of high, medium, and low Earth orbit satellite networks with terrestrial networks has become a critical direction for future communication technologies. The objective is to develop a space-terrestrial integrated 6G network that ensures ubiquitous connectivity and seamless services, facilitating intelligent interconnection and collaborative symbiosis among humans, machines, and objects. This integration has become a central focus of global technological innovation. 展开更多
关键词 communication technologiesthe space terrestrial integrated G network g network satellite constellations terrestrial networks artificial intelligence ai intelligent int satellite networks
在线阅读 下载PDF
A High Destruction-Resistant Resilient Networking Platform for Air-to-Ground Cooperative Communications
7
作者 Dong Ping Ren Jiaxin +3 位作者 Guo Jiannan Zhang Yuzhen Liu Qianwen Amr Tolba 《China Communications》 2025年第4期27-41,共15页
With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.Howev... With the continuous advancement of communication and unmanned aerial vehicle(UAV)technologies,the collaborative operations of diverse platforms,including UAVs and ground vehicles,have been significantly promoted.However,battlefield uncertainties,such as equipment failures and enemy attacks,can impact these collaborative operations'stability and communication efficiency.To this end,we design a highly destruction-resistant air-ground cooperative resilient networking platform that aims to enhance the robustness of network communications by integrating ground vehicle information for UAV network deployment.It then incorporates the concept of virtual guiding force,enabling the UAV swarm to adaptively configure its network layout based on ground vehicle information,thereby improving network destruction resistance.Simulation results demonstrate that the UAV swarm involved in the proposed platform exhibits balanced flight energy consumption and excellent performance in network destruction resistance. 展开更多
关键词 air-to-ground coordination network destruction resistance SpringBoot UAV
在线阅读 下载PDF
A Hierarchical-Based Sequential Caching Scheme in Named Data Networking
8
作者 Zhang Junmin Jin Jihuan +3 位作者 Hou Rui Dong Mianxiong Kaoru Ota Zeng Deze 《China Communications》 2025年第5期48-60,共13页
Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently r... Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently realize load balancing.However,such a ubiquitous caching approach may cause problems including duplicate caching and low data diversity,thus reducing the caching efficiency of NDN routers.To mitigate these caching problems and improve the NDN caching efficiency,in this paper,a hierarchical-based sequential caching(HSC)scheme is proposed.In this scheme,the NDN routers in the data transmission path are divided into various levels and data with different request frequencies are cached in distinct router levels.The aim is to cache data with high request frequencies in the router that is closest to the content requester to increase the response probability of the nearby data,improve the data caching efficiency of named data networks,shorten the response time,and reduce cache redundancy.Simulation results show that this scheme can effectively improve the cache hit rate(CHR)and reduce the average request delay(ARD)and average route hop(ARH). 展开更多
关键词 hierarchical router named data networking sequential caching
在线阅读 下载PDF
MTTSNet:Military time-sensitive targets stealth network via real-time mask generation
9
作者 Siyu Wang Xiaogang Yang +4 位作者 Ruitao Lu Zhengjie Zhu Fangjia Lian Qing-ge Li Jiwei Fan 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期601-612,共12页
The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time... The automatic stealth task of military time-sensitive targets plays a crucial role in maintaining national military security and mastering battlefield dynamics in military applications.We propose a novel Military Time-sensitive Targets Stealth Network via Real-time Mask Generation(MTTSNet).According to our knowledge,this is the first technology to automatically remove military targets in real-time from videos.The critical steps of MTTSNet are as follows:First,we designed a real-time mask generation network based on the encoder-decoder framework,combined with the domain expansion structure,to effectively extract mask images.Specifically,the ASPP structure in the encoder could achieve advanced semantic feature fusion.The decoder stacked high-dimensional information with low-dimensional information to obtain an effective mask layer.Subsequently,the domain expansion module guided the adaptive expansion of mask images.Second,a context adversarial generation network based on gated convolution was constructed to achieve background restoration of mask positions in the original image.In addition,our method worked in an end-to-end manner.A particular semantic segmentation dataset for military time-sensitive targets has been constructed,called the Military Time-sensitive Target Masking Dataset(MTMD).The MTMD dataset experiment successfully demonstrated that this method could create a mask that completely occludes the target and that the target could be hidden in real time using this mask.We demonstrated the concealment performance of our proposed method by comparing it to a number of well-known and highly optimized baselines. 展开更多
关键词 Deep learning Military application Targets stealth network Mask generation Generative adversarial network
在线阅读 下载PDF
Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services
10
作者 Sangmin Kim Byeongcheon Lee +2 位作者 Muazzam Maqsood Jihoon Moon Seungmin Rho 《Computer Modeling in Engineering & Sciences》 2025年第5期2079-2108,共30页
The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children a... The increased accessibility of social networking services(SNSs)has facilitated communication and information sharing among users.However,it has also heightened concerns about digital safety,particularly for children and adolescents who are increasingly exposed to online grooming crimes.Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims.However,research on grooming detection in South Korea remains limited,as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations,leading to inaccurate classifications.To address these issues,this study proposes a novel framework that integrates optical character recognition(OCR)technology with KcELECTRA,a deep learning-based natural language processing(NLP)model that shows excellent performance in processing the colloquial Korean language.In the proposed framework,the KcELECTRA model is fine-tuned by an extensive dataset,including Korean social media conversations,Korean ethical verification data from AI-Hub,and Korean hate speech data from Hug-gingFace,to enable more accurate classification of text extracted from social media conversation images.Experimental results show that the proposed framework achieves an accuracy of 0.953,outperforming existing transformer-based models.Furthermore,OCR technology shows high accuracy in extracting text from images,demonstrating that the proposed framework is effective for online grooming detection.The proposed framework is expected to contribute to the more accurate detection of grooming text and the prevention of grooming-related crimes. 展开更多
关键词 Online grooming KcELECTRA natural language processing optical character recognition social networking service text classification
在线阅读 下载PDF
Multi-Band Integrated Networking for Efficient Spectrum Utilization in 6G
11
作者 Wang Ailing Kong Lei +4 位作者 Liu Jianjun Xia Liang Wang Xiaoqian Wang Qixing Liu Guangyi 《China Communications》 2025年第4期42-54,共13页
The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic c... The sixth-generation(6G)networks will consist of multiple bands such as low-frequency,midfrequency,millimeter wave,terahertz and other bands to meet various business requirements and networking scenarios.The dynamic complementarity of multiple bands are crucial for enhancing the spectrum efficiency,reducing network energy consumption,and ensuring a consistent user experience.This paper investigates the present researches and challenges associated with deployment of multi-band integrated networks in existing infrastructures.Then,an evolutionary path for integrated networking is proposed with the consideration of maturity of emerging technologies and practical network deployment.The proposed design principles for 6G multi-band integrated networking aim to achieve on-demand networking objectives,while the architecture supports full spectrum access and collaboration between high and low frequencies.In addition,the potential key air interface technologies and intelligent technologies for integrated networking are comprehensively discussed.It will be a crucial basis for the subsequent standards promotion of 6G multi-band integrated networking technology. 展开更多
关键词 full spectrum access high and low frequency collaboration multi-band integrated networking 6G spectrum efficiency
在线阅读 下载PDF
Key technologies for networking in satellite-terrestrial integrated network
12
作者 Haijun ZHANG Sichen LU Xiaoqi ZHANG 《Chinese Journal of Aeronautics》 2025年第9期267-270,共4页
1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring na... 1.Introduction As a key development of the next-generation spatial information infrastructure,1the Satellite-Terrestrial Integrated Network(STIN)has become a strategic priority actively pursued by major spacefaring nations and regions,including the United States,Europe,China,and Russia.Specifically,Space X’s Starlink project has deployed over 6750 satellites,2while One Web has completed its initial phase of satellite constellation deployment with more than 600 satellites. 展开更多
关键词 satellite terrestrial integrated network satellite constellation starlink project next generation spatial information infrastructure Starlink OneWeb STIN
原文传递
Cytotoxic anthrone–cyclopentenone heterodimers from the fungus Penicillium sp.guided by molecular networking
13
作者 Ruiyun Huo Jiayu Dong +2 位作者 Gaoran Liu Ying Shi Ling Liu 《Chinese Journal of Natural Medicines》 2025年第10期1259-1267,共9页
(±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified co... (±)-Penicithrones A–D(1a/1b–4a/4b),four novel pairs of anthrone–cyclopentenone heterodimers characterized by a distinctive bridged 6/6/6−5 tetracyclic core skeleton,together with three previously identified compounds(5–7),were isolated from the crude extract of the mangrove-derived fungus Penicillium sp.,guided by heteronuclear single quantum correlation(HSQC)-based small molecule accurate recognition technology(SMART 2.0)and liquid chromatography-tandem mass spectrometry(LC-MS/MS)-based molecular networking.The structural elucidation of new compounds was accomplished through comprehensive spectroscopic analysis,and their absolute configurations were determined using DP4+^(13)C nuclear magnetic resonance(NMR)calculations and electronic circular dichroism(ECD)calculations.Compounds 1a/1b–4a/4b demonstrated moderate cytotoxicity against three human cancer cell lines HeLa,HCT116 and MCF-7 with half maximal inhibitory concentration(IC50)values ranging from 15.95±1.64 to 28.56±2.59μmol·L–1. 展开更多
关键词 Mangrove-derived fungi Molecular networking HSQC-based SMART Structure elucidation DP4+13C NMR calculation Cytotoxic activity
原文传递
Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking
14
作者 Abdullah M.Alnajim Faisal Mohammed Alotaibi Sheroz Khan 《Computers, Materials & Continua》 2025年第6期4515-4535,共21页
Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited late... Distributed denial of service(DDoS)attacks are common network attacks that primarily target Internet of Things(IoT)devices.They are critical for emerging wireless services,especially for applications with limited latency.DDoS attacks pose significant risks to entrepreneurial businesses,preventing legitimate customers from accessing their websites.These attacks require intelligent analytics before processing service requests.Distributed denial of service(DDoS)attacks exploit vulnerabilities in IoT devices by launchingmulti-point distributed attacks.These attacks generate massive traffic that overwhelms the victim’s network,disrupting normal operations.The consequences of distributed denial of service(DDoS)attacks are typically more severe in software-defined networks(SDNs)than in traditional networks.The centralised architecture of these networks can exacerbate existing vulnerabilities,as these weaknesses may not be effectively addressed in this model.The preliminary objective for detecting and mitigating distributed denial of service(DDoS)attacks in software-defined networks(SDN)is to monitor traffic patterns and identify anomalies that indicate distributed denial of service(DDoS)attacks.It implements measures to counter the effects ofDDoS attacks,and ensure network reliability and availability by leveraging the flexibility and programmability of SDN to adaptively respond to threats.The authors present a mechanism that leverages the OpenFlow and sFlow protocols to counter the threats posed by DDoS attacks.The results indicate that the proposed model effectively mitigates the negative effects of DDoS attacks in an SDN environment. 展开更多
关键词 Software-defined networking(SDN) distributed denial of service(DDoS)attack sampling Flow(sFlow) OpenFlow OpenDaylight controller
在线阅读 下载PDF
改进Deep Q Networks的交通信号均衡调度算法
15
作者 贺道坤 《机械设计与制造》 北大核心 2025年第4期135-140,共6页
为进一步缓解城市道路高峰时段十字路口的交通拥堵现象,实现路口各道路车流均衡通过,基于改进Deep Q Networks提出了一种的交通信号均衡调度算法。提取十字路口与交通信号调度最相关的特征,分别建立单向十字路口交通信号模型和线性双向... 为进一步缓解城市道路高峰时段十字路口的交通拥堵现象,实现路口各道路车流均衡通过,基于改进Deep Q Networks提出了一种的交通信号均衡调度算法。提取十字路口与交通信号调度最相关的特征,分别建立单向十字路口交通信号模型和线性双向十字路口交通信号模型,并基于此构建交通信号调度优化模型;针对Deep Q Networks算法在交通信号调度问题应用中所存在的收敛性、过估计等不足,对Deep Q Networks进行竞争网络改进、双网络改进以及梯度更新策略改进,提出相适应的均衡调度算法。通过与经典Deep Q Networks仿真比对,验证论文算法对交通信号调度问题的适用性和优越性。基于城市道路数据,分别针对两种场景进行仿真计算,仿真结果表明该算法能够有效缩减十字路口车辆排队长度,均衡各路口车流通行量,缓解高峰出行方向的道路拥堵现象,有利于十字路口交通信号调度效益的提升。 展开更多
关键词 交通信号调度 十字路口 Deep Q networks 深度强化学习 智能交通
在线阅读 下载PDF
Discovery of unusual phloroglucinol-triterpenoid adducts from Leptospermum scoparium and Xanthostemon chrysanthus by building blocks-based molecular networking 被引量:3
16
作者 Jinyan Zhang Fen Liu +7 位作者 Qian Jin Xueyi Li Qiong Zhan Mu Chen Sisi Wang Zhenlong Wu Wencai Ye Lei Wang 《Chinese Chemical Letters》 SCIE CAS CSCD 2024年第6期353-357,共5页
The first phloroglucinol-triterpenoid hybrids,myrtphlotritins A-E(1-5),were rapidly recognized and isolated from two species of Myrtaceae by employing the building blocks-based molecular network(BBMN)strategy.Compound... The first phloroglucinol-triterpenoid hybrids,myrtphlotritins A-E(1-5),were rapidly recognized and isolated from two species of Myrtaceae by employing the building blocks-based molecular network(BBMN)strategy.Compounds 1-5 featured new carbon skeletons in which phloroglucinol derivatives were coupled with lupane-and dammarane-type triterpenoids through different linkage patterns.Their structures and absolute configurations were elucidated by comprehensive analysis of spectroscopic data and quantum chemical calculations.Biosynthetic pathways for compounds 1-5 were proposed on the basis of the coexisting precursors.Guided by the biogenetic pathways,the biomimetic synthesis of compound 1 was also achieved.Additionally,compounds 2,3,and 5 exhibited potent antiviral activities against herpes simplex virus type-1(HSV-1)infection,and compounds 2 and 5 displayed significant anti-inflammatory activities on RAW264.7 cells. 展开更多
关键词 Phloroglucinol-triterpenoid adduct MYRTACEAE Building blocks-based molecular network Biomimetic synthesis Antiviral activity Anti-inflammatory activity
原文传递
Insights into microbiota community dynamics and flavor development mechanism during golden pomfret(Trachinotus ovatus)fermentation based on single-molecule real-time sequencing and molecular networking analysis 被引量:2
17
作者 Yueqi Wang Qian Chen +5 位作者 Huan Xiang Dongxiao Sun-Waterhouse Shengjun Chen Yongqiang Zhao Laihao Li Yanyan Wu 《Food Science and Human Wellness》 SCIE CSCD 2024年第1期101-114,共14页
Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the ... Popular fermented golden pomfret(Trachinotus ovatus)is prepared via spontaneous fermentation;however,the mechanisms underlying the regulation of its flavor development remain unclear.This study shows the roles of the complex microbiota and the dynamic changes in microbial community and flavor compounds during fish fermentation.Single-molecule real-time sequencing and molecular networking analysis revealed the correlations among different microbial genera and the relationships between microbial taxa and volatile compounds.Mechanisms underlying flavor development were also elucidated via KEGG based functional annotations.Clostridium,Shewanella,and Staphylococcus were the dominant microbial genera.Forty-nine volatile compounds were detected in the fermented fish samples,with thirteen identified as characteristic volatile compounds(ROAV>1).Volatile profiles resulted from the interactions among the microorganisms and derived enzymes,with the main metabolic pathways being amino acid biosynthesis/metabolism,carbon metabolism,and glycolysis/gluconeogenesis.This study demonstrated the approaches for distinguishing key microbiota associated with volatile compounds and monitoring the industrial production of high-quality fermented fish products. 展开更多
关键词 Fermented golden pomfret Microbiota community Volatile compound Co-occurrence network Metabolic pathway
在线阅读 下载PDF
MEC-Empowered Non-Terrestrial Network for 6G Wide-Area Time-Sensitive Internet of Things 被引量:3
18
作者 Chengxiao Liu Wei Feng +1 位作者 Xiaoming Tao Ning Ge 《Engineering》 SCIE EI 2022年第1期96-107,共12页
In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-... In the upcoming sixth-generation(6G)era,the demand for constructing a wide-area time-sensitive Internet of Things(IoT)continues to increase.As conventional cellular technologies are difficult to directly use for wide-area time-sensitive IoT,it is beneficial to use non-terrestrial infrastructures,including satellites and unmanned aerial vehicles(UAVs).Thus,we can build a non-terrestrial network(NTN)using a cell-free architecture.Driven by the time-sensitive requirements and uneven distribution of IoT devices,the NTN must be empowered using mobile edge computing(MEC)while providing oasisoriented on-demand coverage for devices.Nevertheless,communication and MEC systems are coupled with each other under the influence of a complex propagation environment in the MEC-empowered NTN,which makes it difficult to coordinate the resources.In this study,we propose a process-oriented framework to design communication and MEC systems in a time-division manner.In this framework,large-scale channel state information(CSI)is used to characterize the complex propagation environment at an affordable cost,where a nonconvex latency minimization problem is formulated.Subsequently,the approximated problem is provided,and it can be decomposed into sub-problems.These sub-problems are then solved iteratively.The simulation results demonstrated the superiority of the proposed process-oriented scheme over other algorithms,implied that the payload deployments of UAVs should be appropriately predesigned to improve the efficiency of using resources,and confirmed that it is advantageous to integrate NTN with MEC for wide-area time-sensitive IoT. 展开更多
关键词 CELL-FREE Mobile edge computing Non-terrestrial networks Sixth-generation Wide-area time-sensitive IoT
在线阅读 下载PDF
LATITUDES Network:提升证据合成稳健性的效度(偏倚风险)评价工具库
19
作者 廖明雨 熊益权 +7 位作者 赵芃 郭金 陈靖文 刘春容 贾玉龙 任燕 孙鑫 谭婧 《中国循证医学杂志》 北大核心 2025年第5期614-620,共7页
证据合成是对现有研究证据进行系统收集、分析和整合的过程,其结果依赖于纳入原始研究的质量,而效度评价(validity assessment,又称偏倚风险评价)则是评估这些原始研究质量的重要手段。现有效度评价工具种类繁多,但部分工具缺乏严格的... 证据合成是对现有研究证据进行系统收集、分析和整合的过程,其结果依赖于纳入原始研究的质量,而效度评价(validity assessment,又称偏倚风险评价)则是评估这些原始研究质量的重要手段。现有效度评价工具种类繁多,但部分工具缺乏严格的开发过程和评估,证据合成过程中应用不恰当的效度评价工具开展文献质量评价,可能会影响研究结论的准确性,误导临床实践。为解决这一困境,2023年9月英国Bristol大学学者牵头成立了效度评价工具一站式资源站LATITUDES Network。该网站致力于收集、整理和推广研究效度评价工具,以促进原始研究效度评价的准确性,提升证据合成的稳健性和可靠性。本文对LATITUDES Network成立背景、收录的效度评价工具,以及评价工具使用的培训资源等内容进行了详细介绍,以期为国内学者更多地了解LATITUDES Network,更好地运用恰当的效度评价工具开展文献质量评价,以及为开发效度评价工具等提供参考。 展开更多
关键词 效度评价 偏倚风险 证据合成 LATITUDES network
原文传递
Rapid discovery of two unprecedented meroterpenoids from Daphne altaica Pall.using molecular networking integrated with MolNetEnhancer and Network Annotation Propagation 被引量:1
20
作者 Wei-Yu Zhou Zi-Han Xi +7 位作者 Ning-Ning Du Li Ye Ming-Hao Jiang Jin-Le Hao Bin Lin Guo-Dong Yao Xiao-Xiao Huang Shao-Jiang Song 《Chinese Chemical Letters》 SCIE CAS CSCD 2024年第8期294-298,共5页
Under the guidance of the approach which integrates molecular networking,MolNetEnhancer and Net-work Annotation Propagation(NAP),daphnaltaicanoids A and B(1 and 2)with unprecedented 9-oxa-tetracyclo[6.6.1.0^(2,6).0^(8... Under the guidance of the approach which integrates molecular networking,MolNetEnhancer and Net-work Annotation Propagation(NAP),daphnaltaicanoids A and B(1 and 2)with unprecedented 9-oxa-tetracyclo[6.6.1.0^(2,6).0^(8,13)]pentadecane and tetracyclo[5.3.0.1^(2,5).2^(4,11)]tridecane central frameworks were iso-lated from Daphne altaica Pall.,representing two types of unparalleled meroterpenoid cores.Their struc-tures were elucidated by extensive spectroscopic analysis,nuclear magnetic resonance(NMR)calcula-tions,DP4+analysis and electronic circular dichroism(ECD)calculations.The plausible biosynthetic path-ways for 1 and 2 were postulated.Biologically,2 exerted potent neuroprotective activities which were su-perior to trolox at 12.5 and 25μmol/L.Moreover,1 and 2 exhibited more noticeable acetylcholinesterase inhibitory activities than donepezil.Molecular docking simulations were performed to explore the inter-molecular interaction of compounds 1 and 2 with acetylcholinesterase.The bioactivity evaluation results highlight the prospects of 1 and 2 as a novel category of neurological agents. 展开更多
关键词 Daphne altaica Pall. Molecular networking MolNetEnhancer NAP Unprecedented meroterpenoid frameworks Neuroprotective activities Acetylcholinesterase inhibitors
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部