期刊文献+
共找到3,001篇文章
< 1 2 151 >
每页显示 20 50 100
LncRNA LBX2-AS1调节miR-873-5p/G6PD轴对胃癌细胞增殖迁移和侵袭的影响
1
作者 王甜甜 温媛 +3 位作者 郭影 叶美红 李振 师振 《河北医学》 CAS 2024年第9期1488-1495,共8页
目的:探讨长链非编码RNA(LncRNA)瓢虫同源盒2反义RNA1(LBX2-AS1)调节微小RNA-873-5p(miR-873-5p)/葡萄糖-6-磷酸脱氢酶(G6PD)轴对胃癌(GC)细胞增殖、迁移和侵袭的影响。方法:以SGC7901细胞为研究对象,将其随机分为Control组、sh-NC组、s... 目的:探讨长链非编码RNA(LncRNA)瓢虫同源盒2反义RNA1(LBX2-AS1)调节微小RNA-873-5p(miR-873-5p)/葡萄糖-6-磷酸脱氢酶(G6PD)轴对胃癌(GC)细胞增殖、迁移和侵袭的影响。方法:以SGC7901细胞为研究对象,将其随机分为Control组、sh-NC组、sh-LBX2-AS1组、sh-LBX2-AS1+inhibitor-NC组、sh-LBX2-AS1+miR-873-5p inhibitor组;qRT-PCR法检测LncRNA LBX2-AS1、miR-873-5p、G6PD的表达;MTT法和平板克隆实验检测SGC7901细胞增殖;划痕实验检测SGC7901细胞迁移;Transwell实验检测SGC7901细胞的侵袭;Western blot检测SGC7901细胞中MMP-2、PCNA、MMP-9、G6PD蛋白表达;荧光素酶报告基因实验检测LncRNA LBX2-AS1与miR-873-5p,miR-873-5p与G6PD之间的相互作用;小鼠荷瘤实验验证敲除LncRNALBX2-AS1对CC肿瘤生长及G6PD表达的影响。结果:sh-LBX2-AS1组SGC7901细胞中A490值、克隆数、划痕愈合率、侵袭数、LncRNA LBX2-AS1、G6PD mRNA和PCNA、MMP-2、MMP-9蛋白表达低于sh-NC组、Control组,miR-873-5p表达高于sh-NC组、Control组(P<0.05);与sh-LBX2-AS1组、sh-LBX2-AS1+inhibitor-NC组相比,sh-LBX2-AS+miR-873-5p inhibitor组miR-873-5p表达降低,A490值、克隆数、划痕愈合率、侵袭数、G6PD mRNA和PCNA、MMP-2、MMP-9蛋白表达升高(P<0.05)。LncRNA LBX2-AS1靶向负调控miR-873-5p,miR-873-5p靶向负调控G6PD。实验组移植瘤质量、体积、Ki-67阳性率、G6PD阳性率低于对照组(P<0.05)。结论:敲除LncRNA LBX2-AS1可能抑制GC细胞的增殖、迁移和侵袭,其机制可能是调节miR-873-5p/G6PD轴实现的。 展开更多
关键词 长链非编码rNA 瓢虫同源盒2反义rNA1 微小rNA-873-5p 葡萄糖-6-磷酸脱氢酶(g6PD) 胃癌 增殖 迁移 侵袭
下载PDF
血清miR-133a、sCD44v6、胃泌素-17在胃癌和癌前病变筛查中的应用及与Hp-IgG表达的关系 被引量:1
2
作者 陈群 陈希 《临床和实验医学杂志》 2024年第4期361-366,共6页
目的 探究血清微小RNA-133a(miR-133a)、可溶性CD44变体6(sCD44v6)和胃泌素-17在胃癌和癌前病变筛查中的应用,并研究其与幽门螺杆菌-免疫球蛋白G(Hp-IgG)表达的关系。方法 回顾性选取2020年1月至2023年1月在重庆市开州区人民医院就诊的... 目的 探究血清微小RNA-133a(miR-133a)、可溶性CD44变体6(sCD44v6)和胃泌素-17在胃癌和癌前病变筛查中的应用,并研究其与幽门螺杆菌-免疫球蛋白G(Hp-IgG)表达的关系。方法 回顾性选取2020年1月至2023年1月在重庆市开州区人民医院就诊的胃癌患者103例(胃癌组)、癌前病变患者112例(癌前病变组)及同期在本院进行体检的健康志愿者100名(对照组)作为本次研究对象。收集各组对象的血清miR-133a、sCD44v6、胃泌素-17水平,并探究其对胃癌及癌前病变筛查的诊断价值。比较癌前病变组及胃癌组患者Hp-IgG检测结果,并分析胃癌组及癌前病变组Hp-IgG阳性率与血清miR-133a、sCD44v6、胃泌素-17水平的相关性。结果 癌前病变组、胃癌组患者血清miR-133a相对表达水平低于对照组,sCD44v6、胃泌素-17水平高于对照组,且胃癌组血清miR-133a相对表达水平低于癌前病变组,sCD44v6、胃泌素-17水平高于癌前病变组,差异均有统计学意义(P<0.05)。血清miR-133a相对表达水平、sCD44v6、胃泌素-17水平诊断癌前病变的曲线下面积(AUC)值分别为0.621、0.932、0.945(P<0.05)。血清miR-133a相对表达水平、sCD44v6、胃泌素-17水平诊断胃癌的AUC值分别为0.864、0.876、0.845(P<0.05)。胃癌组患者的Hp-IgG阳性率为79.61%,高于癌前病变组(41.07%),差异有统计学意义(P<0.05)。癌前病变组患者的Hp-IgG阳性率与血清miR-133a相对表达水平无明显相关性(r=-0.065,P>0.05),与sCD44v6、胃泌素-17水平呈正相关(r=0.404、0.344,P<0.05)。胃癌组患者的Hp-IgG阳性率与血清miR-133a相对表达水平呈负相关(r=-0.693,P<0.05),与sCD44v6、胃泌素-17水平呈正相关(r=0.765、0.766,P<0.05)。结论 在胃癌和癌前病变中,血清miR-133a的相对表达水平较低,而sCD44v6和胃泌素-17的水平较高,且具有一定诊断价值,可用于胃癌和癌前病变的筛查。胃癌患者的Hp-IgG阳性率较高,并且与血清miR-133a呈负相关,与sCD44v6和胃泌素-17呈正相关。在癌前病变患者中,Hp-IgG阳性率与血清miR-133a相对表达水平无明显相关性,但与sCD44v6和胃泌素-17的水平呈正相关,应密切关注Hp-IgG在患者中的表达情况。 展开更多
关键词 微小rNA-133a 可溶性CD44变体6 胃泌素-17 胃癌 癌前病变 幽门螺杆菌-免疫球蛋白g
下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
3
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6g networks noise injection attacks gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Satellite Communications with 5G, B5G, and 6G: Challenges and Prospects 被引量:1
4
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2024年第3期31-49,共19页
Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity comm... Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity communication, yet it is not without its challenges. Paramount concerns encompass spectrum allocation, the harmonization of network architectures, and inherent latency issues in satellite transmissions. Potential mitigations, such as dynamic spectrum sharing and the deployment of edge computing, are explored as viable solutions. Looking ahead, the advent of quantum communications within satellite frameworks and the integration of AI spotlight promising research trajectories. These advancements aim to foster a seamless and synergistic coexistence between satellite communications and next-gen mobile networks. 展开更多
关键词 Satellite Communications Spectrum Allocation Edge Computing AI Integration 5g B5g 6g
下载PDF
面向6G的RIS辅助通信系统的信道估计技术
5
作者 张力康 杜清河 +1 位作者 卢忱 唐辉 《移动通信》 2024年第6期75-80,共6页
随着对未来6G技术的持续探索,RIS作为潜在的革命性技术之一,已展现出在提高通信系统容量、扩大覆盖范围和降低能耗等多个方面的巨大潜力。在RIS辅助的通信系统中,信道估计是实现RIS技术优势的关键环节之一。首先系统地概述了RIS的技术... 随着对未来6G技术的持续探索,RIS作为潜在的革命性技术之一,已展现出在提高通信系统容量、扩大覆盖范围和降低能耗等多个方面的巨大潜力。在RIS辅助的通信系统中,信道估计是实现RIS技术优势的关键环节之一。首先系统地概述了RIS的技术特点和在现代通信中的应用前景。然后,针对不同应用场景的特点,梳理并归纳了现有的RIS辅助通信场景中的信道估计关键技术,阐明了各研究热点的目标和方法。最后,探讨了RIS辅助通信场景中的信道估计技术在实际应用中所面临的技术挑战。 展开更多
关键词 可重构智能表面 信道估计 6g 无线通信
下载PDF
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
6
作者 Qusay M.Salih Md.Arafatur Rahman +4 位作者 Ahmad Firdaus Mohammed Rajih Jassim Hasan Kahtan Jasni Mohamad Zain Ahmed Hussein Ali 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2165-2206,共42页
The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubt... The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already begun.To realize its full potential over the next decade,6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones.However,the studies about 6G are mainly limited and scattered,whereas no bibliometric study covers the 6G field.Thus,this study aims to review,examine,and summarize existing studies and research activities in 6G.This study has examined the Scopus database through a bibliometric analysis of more than 1,000 papers published between 2017 and 2021.Then,we applied the bibliometric analysis methods by including(1)document type,(2)subject area,(3)author,and(4)country of publication.The study’s results reflect the research 6G community’s trends,highlight important research challenges,and elucidate potential directions for future research in this interesting area. 展开更多
关键词 6g BIBLIOMETrIC wireless networks rEVIEW
下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
7
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6g multi-cloud trusted Infrastructure remote attestation commercial cipher
下载PDF
Digital twin-and extended reality-based telepresence for collaborative robot programming in the 6G perspective
8
作者 Davide Calandra F.Gabriele Pratticò +2 位作者 Alberto Cannavò Claudio Casetti Fabrizio Lamberti 《Digital Communications and Networks》 SCIE CSCD 2024年第2期315-327,共13页
In the context of Industry 4.0,a paradigm shift from traditional industrial manipulators to Collaborative Robots(CRs)is ongoing,with the latter serving ever more closely humans as auxiliary tools in many production pr... In the context of Industry 4.0,a paradigm shift from traditional industrial manipulators to Collaborative Robots(CRs)is ongoing,with the latter serving ever more closely humans as auxiliary tools in many production processes.In this scenario,continuous technological advancements offer new opportunities for further innovating robotics and other areas of next-generation industry.For example,6G could play a prominent role due to its human-centric view of the industrial domains.In particular,its expected dependability features will pave the way for new applications exploiting highly effective Digital Twin(DT)-and eXtended Reality(XR)-based telepresence.In this work,a novel application for the above technologies allowing two distant users to collaborate in the programming of a CR is proposed.The approach encompasses demanding data flows(e.g.,point cloud-based streaming of collaborating users and robotic environment),with network latency and bandwidth constraints.Results obtained by analyzing this approach from the viewpoint of network requirements in a setup designed to emulate 6G connectivity indicate that the expected performance of forthcoming mobile networks will make it fully feasible in principle. 展开更多
关键词 6g Digital twin TELEPrESENCE Collaborative robots Industry 4.0 Augmented reality Virtual reality Point cloud streaming
下载PDF
Regulator of G protein signaling 6 mediates exercise-induced recovery of hippocampal neurogenesis,learning,and memory in a mouse model of Alzheimer’s disease
9
作者 Mackenzie M.Spicer Jianqi Yang +5 位作者 Daniel Fu Alison N.DeVore Marisol Lauffer Nilufer S.Atasoy Deniz Atasoy Rory A.Fisher 《Neural Regeneration Research》 SCIE CAS 2025年第10期2969-2981,共13页
Hippocampal neuronal loss causes cognitive dysfunction in Alzheimer’s disease.Adult hippocampal neurogenesis is reduced in patients with Alzheimer’s disease.Exercise stimulates adult hippocampal neurogenesis in rode... Hippocampal neuronal loss causes cognitive dysfunction in Alzheimer’s disease.Adult hippocampal neurogenesis is reduced in patients with Alzheimer’s disease.Exercise stimulates adult hippocampal neurogenesis in rodents and improves memory and slows cognitive decline in patients with Alzheimer’s disease.However,the molecular pathways for exercise-induced adult hippocampal neurogenesis and improved cognition in Alzheimer’s disease are poorly understood.Recently,regulator of G protein signaling 6(RGS6)was identified as the mediator of voluntary running-induced adult hippocampal neurogenesis in mice.Here,we generated novel RGS6fl/fl;APP_(SWE) mice and used retroviral approaches to examine the impact of RGS6 deletion from dentate gyrus neuronal progenitor cells on voluntary running-induced adult hippocampal neurogenesis and cognition in an amyloid-based Alzheimer’s disease mouse model.We found that voluntary running in APP_(SWE) mice restored their hippocampal cognitive impairments to that of control mice.This cognitive rescue was abolished by RGS6 deletion in dentate gyrus neuronal progenitor cells,which also abolished running-mediated increases in adult hippocampal neurogenesis.Adult hippocampal neurogenesis was reduced in sedentary APP_(SWE) mice versus control mice,with basal adult hippocampal neurogenesis reduced by RGS6 deletion in dentate gyrus neural precursor cells.RGS6 was expressed in neurons within the dentate gyrus of patients with Alzheimer’s disease with significant loss of these RGS6-expressing neurons.Thus,RGS6 mediated voluntary running-induced rescue of impaired cognition and adult hippocampal neurogenesis in APP_(SWE) mice,identifying RGS6 in dentate gyrus neural precursor cells as a possible therapeutic target in Alzheimer’s disease. 展开更多
关键词 adult hippocampal neurogenesis Alzheimer’s disease dentate gyrus EXErCISE learning/memory neural precursor cells regulator of g protein signaling 6(rgS6)
下载PDF
Intelligent UAV Based Energy Supply for 6G Wireless Powered IoT Networks
10
作者 Miao Jiansong Chen Haoqiang +4 位作者 Wang Pengjie Li Hairui Zhao Yan Mu Junsheng Yan Shi 《China Communications》 SCIE CSCD 2024年第9期321-337,共17页
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with... In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems. 展开更多
关键词 6g wireless powered network energy efficiency IoT intelligent network UAV communication
下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
11
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 Physical layer security 3D positioning 6g communications UAV systems
下载PDF
A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images
12
作者 Yuejie Li Shijun Li 《Computers, Materials & Continua》 SCIE EI 2024年第3期3041-3070,共30页
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is... 6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques. 展开更多
关键词 6g technology blockchain end-to-end recognition Chinese characters natural scene computer vision algorithms convolutional neural network
下载PDF
Distributed Application Addressing in 6G Network
13
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&Network Convergence) DNS(Domain Name System) ICN(Information-Centric Network) 6g
下载PDF
米花型银-氮化钛薄膜SERS基底的制备及罗丹明6G的检测研究
14
作者 邸志刚 高建鑫 +4 位作者 贾春荣 周昊 李金鑫 刘花菊 魏恒勇 《红外与激光工程》 EI CSCD 北大核心 2024年第2期159-167,共9页
罗丹明6G的痕量检测需要具有较高的灵敏度,为提高SERS基底的增强因子从而提高检测灵敏度,设计了米花型SERS基底,采用有限元法对其拉曼增强效果进行仿真,模拟不同中心球半径r、米花花瓣轴a、b、c以及中心球与花瓣间距d条件下电场强度的变... 罗丹明6G的痕量检测需要具有较高的灵敏度,为提高SERS基底的增强因子从而提高检测灵敏度,设计了米花型SERS基底,采用有限元法对其拉曼增强效果进行仿真,模拟不同中心球半径r、米花花瓣轴a、b、c以及中心球与花瓣间距d条件下电场强度的变化,得出最佳结构参数,并计算其SERS增强因子。随后利用电化学沉积法制备该基底,并探究电压值以及柠檬酸三钠和AgNO_(3)的浓度配比对基底结构和性能的影响,从而制备出与理想物理模型形态最接近的米花型银/氮化钛薄膜基底。然后用其对罗丹明6G(R6G)进行痕量检测,探究该基底的拉曼增强效果以及稳定性。实验结果表明,当沉积电压为2V,柠檬酸三钠与AgNO_(3)浓度配比为1∶1 (2 mmol/L∶2 mmol/L)时,得到的米花型TiN-Ag复合SERS基底与理想化模型仿真形态最接近。经过计算得到该基底的增强因子可达10^(15),对罗丹明6G的检测限可达10^(-13)mol/L。实验结果证明设计的基底灵敏度高、稳定性强,可对食品非法添加剂的痕量检测提供技术支撑。 展开更多
关键词 表面增强拉曼光谱 米花型结构 氮化钛薄膜 痕量检测 罗丹明6g
原文传递
SENEX-mediated CDK4/6 inhibition promotes senescence and confers apoptosis resistance in B-cell non-Hodgkin lymphoma
15
作者 JIYU WANG LIUYING YI +3 位作者 KEKE HUANG YANGYANG WANG HUIPING WANG ZHIMIN ZHAI 《BIOCELL》 SCIE 2024年第3期453-462,共10页
Background:The primary cause of treatment failure in patients with refractory or relapsed B-cell non-Hodgkin lymphoma(r/r B-NHL)is resistance to current therapies,and therapy-induced senescence(TIS)stands out as a cru... Background:The primary cause of treatment failure in patients with refractory or relapsed B-cell non-Hodgkin lymphoma(r/r B-NHL)is resistance to current therapies,and therapy-induced senescence(TIS)stands out as a crucial mechanism contributing to tumor drug resistance.Here,we analyzed SENEX/Rho GTPase Activating Protein 18(ARHGAP18)expression and prognostic significance in doxorubicin-induced B-NHL-TIS model and r/r B-NHL patients,investigating its target in B-NHL cell senescence and the effect of combining specific inhibitors on apoptosis resistance in B-NHL-TIS cells.Methods:Raji cells were transfected with the human SENEX shRNA recombinant lentiviral vector(Sh-SENEX)and the empty vector negative(NC)to construct a stable transfection cell line with knockdown of SENEX.Effect of SENEX-silencing on B-NHL-TIS formation,cell function and cell cycle-related pathways was analyzed.Using doxorubicin(DOX)-inducible senescent B-NHL cells combined with the specific cyclin dependent kinase 4/6(CDK4/6)inhibitor Palbociclib to observe that blocking CDK4/6 effects on TIS formation.SENEX expression of 21 B-NHL patients and 8 healthy controls were analyzed by qRT-PCR,and the correlation between its expression and clinical indicators were evaluated.Results:The downregulation of SENEX expression promotes G1-S phase transition and apoptosis while inhibiting cell proliferation,collectively suppressing the formation of TIS in B-NHL.Blockade of CDK4/6 promotes the DOX-induced G1 phase arrest to enhance TIS formation in B-NHL cells which can reverse the regulatory effect of silencing SENEX on B-NHL cell cycle regulation and senescence.The expression levels of SENEX were notably elevated in B-NHL patients compared to healthy controls,and Elevated expression levels of SENEX were associated with poor prognosis of B-NHL patients.Conclusions:SENEX enhances apoptosis resistance in B-NHL by inhibiting CDK4/6,thereby preventing G1-S phase transition and promoting TIS formation. 展开更多
关键词 SENEX B-cell non-Hodgkin lymphoma CDK4/6 g1-S phase transition Therapy-induced senescence Apoptosis resistance
下载PDF
Design Framework of Unsourced Multiple Access for 6G Massive IoT
16
作者 Chunlin Yan Siying Lyu +2 位作者 Sen Wang Yuhong Huang Xiaodong Xu 《China Communications》 SCIE CSCD 2024年第1期1-12,共12页
In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical s... In this paper,ambient IoT is used as a typical use case of massive connections for the sixth generation(6G)mobile communications where we derive the performance requirements to facilitate the evaluation of technical solutions.A rather complete design of unsourced multiple access is proposed in which two key parts:a compressed sensing module for active user detection,and a sparse interleaver-division multiple access(SIDMA)module are simulated side by side on a same platform at balanced signal to noise ratio(SNR)operating points.With a proper combination of compressed sensing matrix,a convolutional encoder,receiver algorithms,the simulated performance results appear superior to the state-of-the-art benchmark,yet with relatively less complicated processing. 展开更多
关键词 channel coding compressed sensing massive Internet-of-Things(IoT) sparse interleaverdivision multiple access(SIDMA) the sixth generation(6g)mobile communications unsourced multiple access
下载PDF
G18NiMoCr3-6铸钢焊接接头低温冲击性能不合格原因
17
作者 李明 李金红 +1 位作者 李辉 刘月 《理化检验(物理分册)》 CAS 2024年第3期41-44,48,共5页
某G18NiMoCr3-6铸钢焊接接头的低温(-40℃)冲击性能不合格。采用力学性能测试、宏观观察、化学成分分析、扫描电镜及能谱分析、金相检验、回火工艺试验等方法分析了焊接接头低温冲击性能不合格的原因。结果表明:焊缝金属在560℃回火时,... 某G18NiMoCr3-6铸钢焊接接头的低温(-40℃)冲击性能不合格。采用力学性能测试、宏观观察、化学成分分析、扫描电镜及能谱分析、金相检验、回火工艺试验等方法分析了焊接接头低温冲击性能不合格的原因。结果表明:焊缝金属在560℃回火时,在原奥氏体晶界处析出了Fe3C薄壳,降低了晶界结合力,使材料产生高温回火脆性,材料的韧-脆转变温度升高,最终造成材料发生低温脆断。 展开更多
关键词 g18NiMoCr3-6铸钢 焊接接头 低温冲击性能 回火脆性
下载PDF
Effect of Artemisia annua (Asteraceae) Extracts on Hemolysis in Individuals with G6PD-Deficiency
18
作者 Jescica Bonarck Sohou Casimir Jiras Kpego Ligan +3 位作者 Salomon Ezechiel Mahougnon Fiogbe Thierry Comlan Marc Medehouenou Fifame Esperance Elvire Kougnimon Casimir Dewanou Akpovi 《Journal of Biosciences and Medicines》 2024年第3期303-315,共13页
Individuals with Glucose-6-phosphate dehydrogenase (G6PD) deficiency are susceptible to hemolytic anemia when exposed to pro-oxidant substances. This study investigates the hemolytic impact of Artemisia annua (A. annu... Individuals with Glucose-6-phosphate dehydrogenase (G6PD) deficiency are susceptible to hemolytic anemia when exposed to pro-oxidant substances. This study investigates the hemolytic impact of Artemisia annua (A. annua) extracts in G6PD-deficient subjects through a mixed experimental approach. In the in vitro phase, red blood cells from G6PD-deficient individuals and rats induced with Dehydroepiandrosterone (DHEA) were exposed to various concentrations of A. annua infusion, with distilled water and physiological saline as positive and negative controls respectively. The in vivo study involved G6PD-deficient Wistar rats divided into three groups receiving A. annua infusion, quinine (positive control), and distilled water (negative control) via gavage. Blood samples were collected for biochemical and hematological analyses. Notably, at a 40% concentration of A. annua infusion, there was a significant increase in the hemolysis rate of G6PD-deficient red blood cells compared to controls (p A. annua exhibited elevated aspartate aminotransferase (129.25 ± 4.55 U/L vs. 80.09 ± 4.03 U/L;p A. annua infusion tested positive for saponins. These findings underscore the risk of hemolysis in G6PD-deficient individuals upon ingesting A. annua. 展开更多
关键词 Artemisia annua INFUSION SAPONINS g6PD Deficiency HEMOLYSIS
下载PDF
面向全息通信的6G智简网络架构 被引量:1
19
作者 张平 许长桥 +3 位作者 李康睿 马丁 肖寒 王目 《无线电通信技术》 北大核心 2024年第3期407-412,共6页
全息通信作为一种全新的未来通信范式,通过再现真实物体细粒度画面,向用户提供三维沉浸式的交互体验,克服了传统媒体交互方式单一和场景临场感不足的问题。然而,相对于传统实时通信业务,全方位沉浸的真实全息通信对网络,特别在带宽、时... 全息通信作为一种全新的未来通信范式,通过再现真实物体细粒度画面,向用户提供三维沉浸式的交互体验,克服了传统媒体交互方式单一和场景临场感不足的问题。然而,相对于传统实时通信业务,全方位沉浸的真实全息通信对网络,特别在带宽、时延、安全性等多方面都提出了更为苛刻的要求。如何更好地扩展6G概念与特征,实现高质量、高沉浸的全息新通信成为当前学术界面临的一大挑战。为解决上述问题,率先提出面向全息通信的6G智简网络架构,旨在通过两层网络架构和三维动作模型合理调配6G泛网资源,解决全息通信所面对的超高带宽、超低时延、超大计算等挑战,推动经济社会高质量发展。 展开更多
关键词 6g 全息通信 智简网络架构
下载PDF
面向6G通信感知一体化的40~50 GHz毫米波信道反射和透射特性研究 被引量:1
20
作者 王洋 刘越洋 +4 位作者 廖希 周继华 宋浩正 任明浩 陈前斌 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第1期146-154,共9页
为解决毫米波信道反射和透射特性测量数据不足、多层材料传播系数计算不准确和传播特性表征不明的问题,该文开展面向6G通信感知一体化(ISAC)的40~50 GHz毫米波信道反射和透射特性研究。首先,基于菲涅尔理论和射线弹跳追踪原理,提出一种... 为解决毫米波信道反射和透射特性测量数据不足、多层材料传播系数计算不准确和传播特性表征不明的问题,该文开展面向6G通信感知一体化(ISAC)的40~50 GHz毫米波信道反射和透射特性研究。首先,基于菲涅尔理论和射线弹跳追踪原理,提出一种室内多层建筑材料传播系数计算方法;然后,利用基于矢量网络分析仪的毫米波信道测量平台,开展40~50 GHz频率范围内多层木板和多层玻璃的反射和透射系数测量活动。结果表明,该方法与测量值间高度吻合,传播系数误差低于0.1,能够准确地刻画毫米波信道反射和透射特性变化规律。此外,研究还发现反射系数谐振特性和有效布儒斯特角特性依赖于电波极化、入射角和材料厚度。 展开更多
关键词 6g 通信感知一体化 毫米波信道 信道测量 信道特性
下载PDF
上一页 1 2 151 下一页 到第
使用帮助 返回顶部