Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network....Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.展开更多
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ...With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs.展开更多
Background:Building brain reserves before dementia onset could represent a promising strategy to prevent Alzheimer’s disease(AD),while how to initiate early cognitive stimulation is unclear.Given that the immature br...Background:Building brain reserves before dementia onset could represent a promising strategy to prevent Alzheimer’s disease(AD),while how to initiate early cognitive stimulation is unclear.Given that the immature brain is more sensitive to environmental stimuli and that brain dynamics decrease with ageing,we reasoned that it would be effective to initiate cognitive stimulation against AD as early as the fetal period.Methods:After conception,maternal AD transgenic mice(3×Tg AD)were exposed to gestational environment enrichment(GEE)until the day of delivery.The cognitive capacity of the offspring was assessed by the Morris water maze and contextual fear-conditioning tests when the offspring were raised in a standard environment to 7 months of age.Western blotting,immunohistochemistry,real-time PCR,immunoprecipitation,chromatin immunoprecipitation(ChIP)assay,electrophysiology,Golgi staining,activity assays and sandwich ELISA were employed to gain insight into the mechanisms underlying the beneficial effects of GEE on embryos and 7–10-month-old adult offspring.Results:We found that GEE markedly preserved synaptic plasticity and memory capacity with amelioration of hallmark pathologies in 7–10-m-old AD offspring.The beneficial effects of GEE were accompanied by global histone hyperacetylation,including those at bdnf promoter-binding regions,with robust BDNF mRNA and protein expression in both embryo and progeny hippocampus.GEE increased insulin-like growth factor 1(IGF1)and activated its receptor(IGF1R),which phosphorylates Ca^(2+)/calmodulin-dependent kinase IV(CaMKIV)at tyrosine sites and triggers its nuclear translocation,subsequently upregulating histone acetyltransferase(HAT)and BDNF transcription.The upregulation of IGF1 mimicked the effects of GEE,while IGF1R or HAT inhibition during pregnancy abolished the GEE-induced CaMKIV-dependent histone hyperacetylation and BDNF upregulation.Conclusions:These findings suggest that activation of IGF1R/CaMKIV/HAT/BDNF signaling by gestational environment enrichment may serve as a promising strategy to delay AD progression.展开更多
基金supported in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant No.2013JM8021the National Natural Science Foundation of China under Grant No.61272458
文摘Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.
基金supported in part by the National Key R&D Program of China under Grant 2019YFB2102400,2016YFF0204001in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2019117.
文摘With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs.
基金This work was supported in part by grants from the NSFC(91632305,91632111,31730035 and 81721005)by the Ministry of Science and Technology of China(2016YFC1305800).
文摘Background:Building brain reserves before dementia onset could represent a promising strategy to prevent Alzheimer’s disease(AD),while how to initiate early cognitive stimulation is unclear.Given that the immature brain is more sensitive to environmental stimuli and that brain dynamics decrease with ageing,we reasoned that it would be effective to initiate cognitive stimulation against AD as early as the fetal period.Methods:After conception,maternal AD transgenic mice(3×Tg AD)were exposed to gestational environment enrichment(GEE)until the day of delivery.The cognitive capacity of the offspring was assessed by the Morris water maze and contextual fear-conditioning tests when the offspring were raised in a standard environment to 7 months of age.Western blotting,immunohistochemistry,real-time PCR,immunoprecipitation,chromatin immunoprecipitation(ChIP)assay,electrophysiology,Golgi staining,activity assays and sandwich ELISA were employed to gain insight into the mechanisms underlying the beneficial effects of GEE on embryos and 7–10-month-old adult offspring.Results:We found that GEE markedly preserved synaptic plasticity and memory capacity with amelioration of hallmark pathologies in 7–10-m-old AD offspring.The beneficial effects of GEE were accompanied by global histone hyperacetylation,including those at bdnf promoter-binding regions,with robust BDNF mRNA and protein expression in both embryo and progeny hippocampus.GEE increased insulin-like growth factor 1(IGF1)and activated its receptor(IGF1R),which phosphorylates Ca^(2+)/calmodulin-dependent kinase IV(CaMKIV)at tyrosine sites and triggers its nuclear translocation,subsequently upregulating histone acetyltransferase(HAT)and BDNF transcription.The upregulation of IGF1 mimicked the effects of GEE,while IGF1R or HAT inhibition during pregnancy abolished the GEE-induced CaMKIV-dependent histone hyperacetylation and BDNF upregulation.Conclusions:These findings suggest that activation of IGF1R/CaMKIV/HAT/BDNF signaling by gestational environment enrichment may serve as a promising strategy to delay AD progression.