期刊文献+
共找到77篇文章
< 1 2 4 >
每页显示 20 50 100
A new approach to obtain K-means initial clustering center based on fuzzy granular computing
1
作者 ZHANG Xia YIN Yi-xin XU Ming-zhu 《通讯和计算机(中英文版)》 2009年第4期51-54,共4页
关键词 算法 模糊计算 聚类 敏感性
在线阅读 下载PDF
A VOXEL BASED MICROCOMPUTER 3D RECONSTRUCTION SYSTEM
2
作者 Chuanping Shi Li Yang +1 位作者 Guangming Li Xianhua Gao 《Chinese Journal of Biomedical Engineering(English Edition)》 1993年第4期159-159,共1页
In recent years,the volumetric approach of 3D reconstruction has emerged as apowerful clinic method for biomedical applications.This approach is based on a voxelrepresented object which maintains many details of the s... In recent years,the volumetric approach of 3D reconstruction has emerged as apowerful clinic method for biomedical applications.This approach is based on a voxelrepresented object which maintains many details of the surface and the internal con-structures of the original body.Because of a huge amount of data,the volume dataset takes a large size of memory,and a high processing speed is required in order… 展开更多
暂未订购
Enhancing personalized exercise recommendation with student and exercise portraits 被引量:1
3
作者 Wei-Wei Gao Hui-Fang Ma +2 位作者 Yan Zhao Jing Wang Quan-Hong Tian 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第2期91-109,共19页
The exercise recommendation system is emerging as a promising application in online learning scenarios,providing personalized recommendations to assist students with explicit learning directions.Existing solutions gen... The exercise recommendation system is emerging as a promising application in online learning scenarios,providing personalized recommendations to assist students with explicit learning directions.Existing solutions generally follow a collaborative filtering paradigm,while the implicit connections between students(exercises)have been largely ignored.In this study,we aim to propose an exercise recommendation paradigm that can reveal the latent connections between student-student(exercise-exercise).Specifically,a new framework was proposed,namely personalized exercise recommendation with student and exercise portraits(PERP).It consists of three sequential and interdependent modules:Collaborative student exercise graph(CSEG)construction,joint random walk,and recommendation list optimization.Technically,CSEG is created as a unified heterogeneous graph with students’response behaviors and student(exercise)relationships.Then,a joint random walk to take full advantage of the spectral properties of nearly uncoupled Markov chains is performed on CSEG,which allows for full exploration of both similar exercises that students have finished and connections between students(exercises)with similar portraits.Finally,we propose to optimize the recommendation list to obtain different exercise suggestions.After analyses of two public datasets,the results demonstrated that PERP can satisfy novelty,accuracy,and diversity. 展开更多
关键词 Educational data mining Exercise recommend Joint random walk Nearly uncoupled Markov chains Optimization Personalized learning
在线阅读 下载PDF
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO 被引量:1
4
作者 Ashraf S.Mashaleh Noor Farizah Binti Ibrahim +2 位作者 Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh 《Computers, Materials & Continua》 SCIE EI 2024年第2期2245-2267,共23页
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection method... Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection methods.This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization(PSO)to address the risks associated with IoT botnets.Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically.Fuzzy component settings are optimized using PSO to improve accuracy.The methodology allows for more complex thinking by transitioning from binary to continuous assessment.Instead of expert inputs,PSO data-driven tunes rules and membership functions.This study presents a complete IoT botnet risk assessment system.The methodology helps security teams allocate resources by categorizing threats as high,medium,or low severity.This study shows how CICIoT2023 can assess cyber risks.Our research has implications beyond detection,as it provides a proactive approach to risk management and promotes the development of more secure IoT environments. 展开更多
关键词 IoT botnet detection risk assessment fuzzy logic particle swarm optimization(PSO) CYBERSECURITY interconnected devices
在线阅读 下载PDF
Fracture detection by using full azimuth P wave attributes 被引量:17
5
作者 Qu Shouli Ji Yuxin Wang Xin Wang Xiuling Chen xinrong Shen Guoqiang 《Applied Geophysics》 SCIE CSCD 2007年第3期238-243,共6页
A type of specific fractured hydrocarbon reservoir, a shale fractured reservoir, exists in the Shengli oilfield. Due to very small porosity of this type, low sensitivity to the variation of petrochemical property para... A type of specific fractured hydrocarbon reservoir, a shale fractured reservoir, exists in the Shengli oilfield. Due to very small porosity of this type, low sensitivity to the variation of petrochemical property parameters, and strong anisotropy, it is very difficult to explore for them. So far, there is no set of mature methods for recognition of direction, distribution, and density of the fractures by an integrated analysis of geologic, geophysical, well log, drilling data, and etc. This paper presents a new method for acoustic impedance variation with azimuth (IPVA), based on existing fracture detection methods. Seismic acquisition, processing, and recognition techniques were developed for detecting directional vertical fractures using multi-azimuth P wave data in combination with the seismic and geological features of shale fractures in the Luojia area. The IPVA research is carried out for recognizing the distribution, strike, and density of fractures based on the study of velocity variation with azimuth (VVA) and amplitude variation with azimuth (AVA) for full azimuth P wave data at different CMP positions. Through practical application in the Luojia area, primary results have been obtained which verifies that the IPVA method provides good potential for quantitative detection of parallel, high angle, shale fractures. 展开更多
关键词 Shale fractures VELOCITY AMPLITUDE acoustic impedance P wave full azimuth
在线阅读 下载PDF
Optimization of beamforming and path planning for UAV-assisted wireless relay networks 被引量:16
6
作者 Ouyang Jian Zhuang Yi +1 位作者 Lin Min Liu Jia 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2014年第2期313-320,共8页
Recently, unmanned aerial vehicles (UAVs) acting as relay platforms have attracted considerable attention due to the advantages of extending coverage and improving connectivity for long-range communications. Specifi... Recently, unmanned aerial vehicles (UAVs) acting as relay platforms have attracted considerable attention due to the advantages of extending coverage and improving connectivity for long-range communications. Specifically, in the scenario where the access point (AP) is mobile, a UAV needs to find an efficient path to guarantee the connectivity of the relay link. Motivated by this fact, this paper proposes an optimal design for beamforming (BF) and UAV path planning. First of all, we study a dual-hop amplify-and-forward (AF) wireless relay network, in which a UAV is used as relay between a mobile AP and a fixed base station (BS). In the network, both of the AP and the BS are equipped with multiple antennas, whereas the UAV has a single antenna. Then, we obtain the output signal^to-noise ratio (SNR) of the dual-hop relay network. Based on the criterion of maximizing the output SNR, we develop an optimal design to obtain the solution of the optimal BF weight vector and the UAV heading angle. Next, we derive the closed-form outage probability (OP) expression to investigate the performance of the dual-hop relay network conveniently. Finally, computer simulations show that the proposed approach can obtain nearly optimal flying path and OP performance, indicating the effectiveness of the proposed algorithm. Furthermore, we find that increasing the antenna number at the BS or the maximal heading angle can significantly improve the performance of the considered relay network. 展开更多
关键词 Aircraft communication Beam forming Path planning Unmanned aerial vehicles Wireless relay networks
原文传递
PREDICTION OF YIELD FUNCTIONS ON BCC POLYCRYSTALS 被引量:5
7
作者 Huang Mojia Fu Mingfu Zheng Chaomei 《Acta Mechanica Solida Sinica》 SCIE EI 2006年第1期75-85,共11页
By the nonlinear optimization theory, we predict the yield function of single BCC crystals in Hill's criterion form. Then we give a formula on the macroscopic yield function of a BCC polycrystal Ω under Sachs' mode... By the nonlinear optimization theory, we predict the yield function of single BCC crystals in Hill's criterion form. Then we give a formula on the macroscopic yield function of a BCC polycrystal Ω under Sachs' model, where the volume average of the yield functions of all BCC crystallites in Ω is taken as the macroscopic yield function of the BCC polycrystal. In constructing the formula, we try to find the relationship among the macroscopic yield function, the orientation distribution function (ODF), and the single BCC crystal's plasticity. An expression for the yield stress of a uniaxial tensile problem is derived under Taylor's model in order to compare the expression with that of the macroscopic yield function. 展开更多
关键词 yield function the ODF BCC polycrystal single BCC crystals ANISOTROPY
在线阅读 下载PDF
WebScope: A New Tool for Fusion Data Analysis and Visualization 被引量:4
8
作者 杨飞 党宁宁 肖炳甲 《Plasma Science and Technology》 SCIE EI CAS CSCD 2010年第2期253-256,共4页
A visualization tool was developed through a web browser based on Java applets embedded into HTML pages, in order to provide a world access to the EAST experimental data. It can display data from various trees in diff... A visualization tool was developed through a web browser based on Java applets embedded into HTML pages, in order to provide a world access to the EAST experimental data. It can display data from various trees in different servers in a single panel. With WebScope, it is easier to make a comparison between different data sources and perform a simple calculation over different data sources. 展开更多
关键词 WebScope EAST MDSPLUS data visualization Java applet
在线阅读 下载PDF
Increase of brightness and transmission efficiency in fiat panel display through serial synchronous scanning mode with double buffers 被引量:4
9
作者 陈章进 陈峰 +2 位作者 冉峰 徐美华 郑方 《Journal of Shanghai University(English Edition)》 CAS 2007年第3期314-317,共4页
This paper presents a serial synchronous scanning mode in fiat panel display (FPD) by adding a latch buffer between the serializer and the driving buffer. Comparing with conventional techniques, the proposed structu... This paper presents a serial synchronous scanning mode in fiat panel display (FPD) by adding a latch buffer between the serializer and the driving buffer. Comparing with conventional techniques, the proposed structure can efficiently reduce the brightness loss and improve the transmission performance. Theoretical analysis and experimental results show that the ratio between the lightest weight display time and the relative transmission time is a tradeoff between brightness loss and transmission efficiency. 展开更多
关键词 fiat panel display (FPD) serial scanning double buffer brightness loss transmission utilization
在线阅读 下载PDF
Research and Application on Web Information Retrieval Based on Improved FP-Growth Algorithm 被引量:3
10
作者 JIAO Minghai YAN Ping JIANG Huiyan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1065-1068,共4页
A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each n... A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each node are kept. Route information of different nodes in a same item are compressed into aggregative chains so that the frequent patterns will be produced in aggregative chains without generating node links and conditional pattern bases. An example of Web key words retrieval is given to analyze and verify the frequent pattern algorithm in this paper. 展开更多
关键词 data mining CHAINS FP-growth algorithm frequent pattern aggregative information retrieval
在线阅读 下载PDF
Heavy mineral stratigraphy of sediments from the southern outer shelf of the East China Sea since the last glaciation using fuzzy C-means cluster method 被引量:1
11
作者 林晓彤 李巍然 +1 位作者 杜树杰 林振宏 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2010年第1期183-189,共7页
Correspondence analysis and fuzzy C-means cluster methods were used to divide the stratigraphy of heavy mineral assemblages, and the sediment sources and depositional dynamics of the environment reconstructed. The ass... Correspondence analysis and fuzzy C-means cluster methods were used to divide the stratigraphy of heavy mineral assemblages, and the sediment sources and depositional dynamics of the environment reconstructed. The assemblages were taken from marine sediments from the late Pleistocene to the Holocene in Core Q43 situated on the outer shelf of the East China Sea. Based on the variable boundaries of the mineral assemblage at 63 and 228 cmbsf (cm below sea floor), the core might have previously been divided into three sediment strata marked with units Ⅰ, Ⅱ and Ⅲ, which would be consistent with the divided sediment stratum of the core using minor element geochemistry. The downcore distribution of heavy minerals divided the sedimentary sequence into three major units, which were further subdivided into four subunits. The interval between 0 and 63 cmbsf of the core (unit Ⅰ), which spans the Holocene and the uppermost late Pleistocene, is characterized by a hornblende-epidote-pyroxene assemblage, and contains relatively a smaller amount of schistic mineral and authigenic pyrite. In comparison, the interval between 63 and 228 cmbsf (unit Ⅱ), is representative of the Last Glacial Maximum (LGM), and features a hornblende-epidote-magnetite-ilmenite assemblage containing the highest concentrations of heavy minerals and opaque minerals. However, the interval between 228 and 309 cmbsf (unit Ⅲ), which spans the subinterglacial period, is characterized by a hornblende-authigenic-pyrite-mica assemblage. Relative ratios of some heavy minerals can be used as tracers of clastic sediment sources. The lower part of the sediment core shows the highest magnetite/ilmenite ratio and relatively high hornblende/augite and hornblende/epidote ratios. The middle core shows the highest hornblende/augite and hornblende/epidote ratios, and the lowest magnetite/ilmenite ratio. The upper part exhibits a slightly higher magnetite/ilmenite ratio, and also the lowest hornblende/augite and hornblende/epidote ratios. The distribution of the mineral ratio is consistent with stratigraphic division in heavy mineral data using correspondence analysis and fuzzy C-means clustering. Variations in heavy mineral association and mineral ratio in core Q43 revealed changes in provenance and depositional environment of the southern outer shelf of the East China Sea since the late Pleistocene, well corresponding to interglacial and glacial cycles. 展开更多
关键词 the Last Glacial Period stratigraphic division heavy mineral East China Sea fuzzy C-meanscluster
原文传递
Web-based Logbook System for EAST Experiments 被引量:1
12
作者 杨飞 肖炳甲 《Plasma Science and Technology》 SCIE EI CAS CSCD 2010年第5期632-635,共4页
Implementation of a web-based logbook system on EAST is introduced, which can store the comments for the experiments into a database and access the documents via various web browsers. The three-tier software architect... Implementation of a web-based logbook system on EAST is introduced, which can store the comments for the experiments into a database and access the documents via various web browsers. The three-tier software architecture and asynchronous access technology are adopted to improve the system effectively. Authorized users can view the information of real-time discharge, comments from others and signal plots; add, delete, or revise their own comments; search signal data or comments under complicated search conditions; and collect relevant information and output it to an excel file. The web pages can be automatically updated after a new discharge is completed and without refreshment. 展开更多
关键词 EAST MDSPLUS logbook DATABASE AJAX
在线阅读 下载PDF
Research of Anti-Plagiarism Monitoring System Model 被引量:2
13
作者 SHEN Yang YUAN Zhongshang +1 位作者 LIU Lu DONG Hui 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期937-940,共4页
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol... We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields. 展开更多
关键词 anti-plagiarism PLAGIARISM information fingerprints copyright protection format-legacy
在线阅读 下载PDF
Baculovirus Surface Display of Zika Virus Envelope Protein Protects against Virus Challenge in Mouse Model 被引量:2
14
作者 Dan Luo Yuanjiu Miao +9 位作者 Xianliang Ke Zhongyuan Tan Chun Hu Penghui Li Ting Wang Yuan Zhang Jianhong Sun Yan Liu Hanzhong Wang Zhenhua Zheng 《Virologica Sinica》 SCIE CAS CSCD 2020年第5期637-650,共14页
Zika virus(ZIKV)is emerging as a significant pathogen worldwide and may cause severe neurological disorders such as fetal microcephaly and Guillain-Barre syndrome.No drug or listed vaccines are currently available for... Zika virus(ZIKV)is emerging as a significant pathogen worldwide and may cause severe neurological disorders such as fetal microcephaly and Guillain-Barre syndrome.No drug or listed vaccines are currently available for preventing ZIKV infection.As a major target of neutralizing,ZIKV envelop(E)protein usually used for vaccine development.Nevertheless,the immunogenicity of ZIKV envelop(E)protein expressed by baculovirus display system has never been assessed.In this study,we reported a new strategy for surface display of ZIKV E protein by a recombinant baculovirus vector derived from Autographa californica multiple nuclear polyhedrosis virus(AcMNPV)and assessed its immunogenicity in mice.We produced recombinant fusion ZIKV E protein linked with signal peptide(SP)and transmembrane domain(TM)of AcMNPV GP64.The results showed that the recombinant protein was easy to produce by baculovirus display system.BALB/c mice immunized with this recombinant E protein developed ZIKV specific serum antibodies.The anti-E protein sera from the mice were able to effectively neutralize ZIKV in vitro.More importantly,AG6(IFN-a/b and IFN-c receptor deficient)mice immunized with recombinant E protein were protected against lethal ZIKV challenge.Together,thesefindings demonstrated that the recombinant E protein displayed by baculovirus can be conveniently prepared and displayed good immunogenicity in immunized mice.It is a promising practical approach for prompting the development of vaccine and related immunology research. 展开更多
关键词 Zika virus(ZIKV) Envelope protein BACULOVIRUS IMMUNOGENICITY Neutralizing antibody Viral challenge
原文传递
Ontology Mapping Based on Bayesian Network 被引量:1
15
作者 张凌宇 陶佰睿 《Journal of Donghua University(English Edition)》 EI CAS 2015年第4期681-687,共7页
Ontology mapping is a key interoperability enabler for the semantic web. In this paper,a new ontology mapping approach called ontology mapping based on Bayesian network( OM-BN) is proposed. OM-BN combines the models o... Ontology mapping is a key interoperability enabler for the semantic web. In this paper,a new ontology mapping approach called ontology mapping based on Bayesian network( OM-BN) is proposed. OM-BN combines the models of ontology and Bayesian Network,and applies the method of Multi-strategy to computing similarity. In OM-BN,the characteristics of ontology,such as tree structure and semantic inclusion relations among concepts,are used during the process of translation from ontology to ontology Bayesian network( OBN). Then the method of Multi-strategy is used to create similarity table( ST) for each concept-node in OBN. Finally,the iterative process of mapping reasoning is used to deduce new mappings from STs,repeatedly. 展开更多
关键词 COMPONENT ontology mapping multi-strategy Bayesian network model
在线阅读 下载PDF
Lanmuchangite, a New Thallium (Hydrous) Sulphate from Lanmuchang, Guizhou Province, China 被引量:1
16
作者 陈代演 王冠鑫 +1 位作者 邹振西 陈郁明 《Chinese Journal Of Geochemistry》 EI CAS 2003年第2期185-192,共8页
Lanmuchangite is a new thallium hydrous sulfate from the oxidation zone hosting rich thallium ore bodies in the Lanmuchang thallium(mercury) ore deposit, Xinren County, Guizhou Province, China. This new mineral is nam... Lanmuchangite is a new thallium hydrous sulfate from the oxidation zone hosting rich thallium ore bodies in the Lanmuchang thallium(mercury) ore deposit, Xinren County, Guizhou Province, China. This new mineral is named after the locality where it was discovered. The mineral is associated with melanterite, pickeringite, potassium alum, jarosite, gypsum, arsenic blane, sulphur and some unknown minerals. The aggregates of lanmuchangite range from 2 to 10 mm in size. In general, the aggregates are compact and massive in form and are composed of anhedral granular crystals measuring in size from 40 to 90μm, but the single crystal grains show distinct boundaries. Parallel columnar aggregates are occasionally seen, which are composed of subhedral to euhedral columnar crystals ranging in size from 15 to 65μm. White, light yellow to white in color, glassy in luster and transparent. Hv-{mess.}=94-124 kg/mm+2, Hm={3.1}-{3.4}, density={2.22} g/cm+3. Under the polarization microscope the mineral is colorless and homogeneous, with N-{meas.}={1.495}. It is easily water-soluble. The average chemical composition is: Tl-2O={33.25}, Al-2O-3={8.07}, SO-3={25.19}, SiO-2={0.10}, K-2O={0.35}, CaO={0.08}, MgO={0.06}, FeO={0.04} and H-2O={33.46} [the crystal water (H-2O) was measured by thermogravimetery (TG) while the other composition were determined by electron microprobe], totaling {100.60%}. The empirical formula is (Tl-{1.00}K-{0.05})-{1.05} (Al-{1.01}Si-{0.01}Ca-{0.01}Mg-{0.01})-{1.04}-{2.01}·{11.88} H-2O and the simplified formula is TlAl-2·12H-2O. The compatibility of lanmuchangite is {-0.03} and its value falls within the range of {±0.020}-{±0.039}, so the compatibility is excellent. Its TG curve demonstrated that the crystal water was lost (i.e., dewatering) in stages at 101, 130 and 230℃. At the temperature of 243℃ the process of dewatering came to the end and the sum of lost crystal water reaches {33.30} wt%. IR spectroscopic analysis showed that the absorption bands 3374-3147 cm+{-1} and 1655-1648 cm+{-1} are due to tensile and bending vibration of crystal water molecules (H-2O) whereas those at 1131 cm+{-1} and 605 cm+{-1} are attributed to tensile and bending vibration of group +{2-}. Lanmuchangite is of the isometric system, with space group=Pa3, a={12.212(5)}, v=1821(2)+3, and Z=4. The strongest diffraction lines from the X-ray power diffraction data are {4.314}(100, 220), {2.801}(70, 331), {7.03}(54, 111), {2.731}(35, 420), {6.11}(27, 200), {3.524}(24, 222), {3.676}(22, 311), {3.051}(22, 400), {2.350}(21, 511), {3.263}(20, 321), {2.494}(20, 422), {1.932}(19, 620). 展开更多
关键词 铊矿床 富铊矿石 贵州 硫酸铊 矿物
在线阅读 下载PDF
Nomogram for predicting transmural bowel infarction in patients with acute superior mesenteric venous thrombosis 被引量:7
17
作者 Meng Jiang Chang-Li Li +4 位作者 Chun-Qiu Pan Wen-Zhi Lv Yu-Fei Ren Xin-Wu Cui Christoph F Dietrich 《World Journal of Gastroenterology》 SCIE CAS 2020年第26期3800-3813,共14页
BACKGROUND The prognosis of acute mesenteric ischemia(AMI)caused by superior mesenteric venous thrombosis(SMVT)remains undetermined and early detection of transmural bowel infarction(TBI)is crucial.The predisposition ... BACKGROUND The prognosis of acute mesenteric ischemia(AMI)caused by superior mesenteric venous thrombosis(SMVT)remains undetermined and early detection of transmural bowel infarction(TBI)is crucial.The predisposition to develop TBI is of clinical concern,which can lead to fatal sepsis with hemodynamic instability and multi-organ failure.Early resection of necrotic bowel could improve the prognosis of AMI,however,accurate prediction of TBI remains a challenge for clinicians.When determining the eligibility for explorative laparotomy,the underlying risk factors for bowel infarction should be fully evaluated.AIM To develop and externally validate a nomogram for prediction of TBI in patients with acute SMVT.METHODS Consecutive data from 207 acute SMVT patients at the Wuhan Tongji Hospital and 89 patients at the Guangzhou Nanfang Hospital between July 2005 and December 2018 were included in this study.They were grouped as training and external validation cohort.The 207 cases(training cohort)from Tongji Hospital were divided into TBI and reversible intestinal ischemia groups based on the final therapeutic outcomes.Univariate and multivariate logistic regression analyses were conducted to identify independent risk factors for TBI using the training data,and a nomogram was subsequently developed.The performance of the nomogram was evaluated with respect to discrimination,calibration,and clinical usefulness in the training and external validation cohort.RESULTS Univariate and multivariate logistic regression analyses identified the following independent prognostic factors associated with TBI in the training cohort:The decreased bowel wall enhancement(OR=6.37,P<0.001),rebound tenderness(OR=7.14,P<0.001),serum lactate levels>2 mmol/L(OR=3.14,P=0.009)and previous history of deep venous thrombosis(OR=6.37,P<0.001).Incorporating these four factors,the nomogram achieved good calibration in the training set[area under the receiver operator characteristic curve(AUC)0.860;95%CI:0.771-0.925]and the external validation set(AUC 0.851;95%CI:0.796-0.897).The positive and negative predictive values(95%CIs)of the nomogram were calculated,resulting in positive predictive values of 54.55%(40.07%-68.29%)and 53.85%(43.66%-63.72%)and negative predictive values of 93.33%(82.14%-97.71%)and 92.24%(85.91%-95.86%)for the training and validation cohorts,respectively.Based on the nomogram,patients who had a Nomo-score of more than 90 were considered to have high risk for TBI.Decision curve analysis indicated that the nomogram was clinically useful.CONCLUSION The nomogram achieved an optimal prediction of TBI in patients with AMI.Using the model,the risk for an individual patient inclined to TBI can be assessed,thus providing a rational therapeutic choice. 展开更多
关键词 Superior mesenteric venous thrombosis Acute mesenteric ischemia Transmural bowel infarction Reversible intestinal ischemia PREDICTORS NOMOGRAM
暂未订购
Low-Cost Embedded Controller for Complex Control Systems 被引量:1
18
作者 Long-Hua Ma Xiao-Long Shi +2 位作者 Hui Li Zhe-Ming Lu Meng Shao 《Journal of Electronic Science and Technology》 CAS 2013年第1期89-95,共7页
Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos ba... Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos based embedded controller is developed on which various control software can be easily modeled, simulated, implemented, and evaluated to meet the ever-expanding requirements of industrial control applications. Built on the Cirrus Logic EP9315 ARM systems-on-chip board, this embedded controller is possible to develop complex embedded control systems that employ advanced control strategies in a rapid and cost-efficient fashion. Due to the free and open source nature of the software packages used, the cost of the embedded controller is minimized. 展开更多
关键词 Complex control embedded systems SCILAB system optimization system-on-chip.
在线阅读 下载PDF
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents 被引量:1
19
作者 GUAN Huanmei MENG Xuejun ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1727-1730,共4页
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agen... The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack. 展开更多
关键词 mobile agent security forward integrity itinerary secrecy truncation attack
在线阅读 下载PDF
AN EFFECT ITERATION ALGORITHM FOR NUMERICAL SOLUTION OF DISCRETE HAMILTON-JACOBI-BELLMAN EQUATIONS 被引量:1
20
作者 Cheng Xiaoliang Xu Yuanji Meng Bingquan 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2005年第3期347-351,共5页
An algorithm for numerical solution of discrete Hamilton-Jacobi-Bellman equations is proposed. The method begins with a suitable initial guess value of the solution,then finds a suitable matrix to linearize the system... An algorithm for numerical solution of discrete Hamilton-Jacobi-Bellman equations is proposed. The method begins with a suitable initial guess value of the solution,then finds a suitable matrix to linearize the system and constructs an iteration algorithm to generate the monotone sequence. The convergence of the algorithm for nonlinear discrete Hamilton-Jacobi-Bellman equations is proved. Some numerical examples are presented to confirm the effciency of this algorithm. 展开更多
关键词 iteration algorthm Hamilton-Jacobi-Bellman equation monotone sequence.
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部