期刊文献+
共找到11,246篇文章
< 1 2 250 >
每页显示 20 50 100
Deciphering the Hidden Secrets between the Early Skin Wrinkling & the Metabolic (X) Syndrome with the Possible Reversal of This Process at the Molecular Level
1
作者 Dalal Alsaadoun 《Journal of Cosmetics, Dermatological Sciences and Applications》 2024年第1期45-68,共24页
The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging ... The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. . 展开更多
关键词 COLLAGEN Skin Wrinkling Glycation Hyper-Insulinemia hidden Obesity Vis-ceral Fat Inflammatory Cytokines
下载PDF
Switchable hidden spin polarization and negative Poisson's ratio in two-dimensional antiferroelectric wurtzite crystals
2
作者 Zhuang Ma Jingwen Jiang +8 位作者 Gui Wang Peng Zhang Yiling Sun Zhengfang Qian Jiaxin Zheng Wen Xiong Fei Wang Xiuwen Zhang Pu Huang 《Journal of Semiconductors》 EI CAS CSCD 2023年第12期72-80,共9页
Two-dimensional(2D)antiferroelectric materials have raised great research interest over the last decade.Here,we reveal a type of 2D antiferroelectric(AFE)crystal where the AFE polarization direction can be switched by... Two-dimensional(2D)antiferroelectric materials have raised great research interest over the last decade.Here,we reveal a type of 2D antiferroelectric(AFE)crystal where the AFE polarization direction can be switched by a certain degree in the 2D plane.Such 2D functional materials are realized by stacking the exfoliated wurtzite(wz)monolayers with“self-healable”nature,which host strongly coupled ferroelasticity/antiferroelectricity and benign stability.The AFE candidates,i.e.,Zn X and Cd X(X=S,Se,Te),are all semiconductors with direct bandgap atΓpoint,which harbors switchable antiferroelectricity and ferroelasticity with low transition barriers,hidden spin polarization,as well as giant in-plane negative Poisson's ratio(NPR),enabling the co-tunability of hidden spin characteristics and auxetic magnitudes via AFE switching.The 2D AFE wz crystals provide a platform to probe the interplay of 2D antiferroelectricity,ferroelasticity,NPR,and spin effects,shedding new light on the rich physics and device design in wz semiconductors. 展开更多
关键词 wurtzite crystal MULTIFERROICS hidden spin polarization negative Poisson's ratio
下载PDF
Existence of hidden attractors in nonlinear hydro-turbine governing systems and its stability analysis
3
作者 赵鹏翀 卫皓娟 +3 位作者 徐振坤 陈帝伊 许贝贝 王雨萌 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期220-228,共9页
This work studies the stability and hidden dynamics of the nonlinear hydro-turbine governing system with an output limiting link,and propose a new six-dimensional system,which exhibits some hidden attractors.The param... This work studies the stability and hidden dynamics of the nonlinear hydro-turbine governing system with an output limiting link,and propose a new six-dimensional system,which exhibits some hidden attractors.The parameter switching algorithm is used to numerically study the dynamic behaviors of the system.Moreover,it is investigated that for some parameters the system with a stable equilibrium point can generate strange hidden attractors.A self-excited attractor with the change of its parameters is also recognized.In addition,numerical simulations are carried out to analyze the dynamic behaviors of the proposed system by using the Lyapunov exponent spectra,Lyapunov dimensions,bifurcation diagrams,phase space orbits,and basins of attraction.Consequently,the findings in this work show that the basins of hidden attractors are tiny for which the standard computational procedure for localization is unavailable.These simulation results are conducive to better understanding of hidden chaotic attractors in higher-dimensional dynamical systems,and are also of great significance in revealing chaotic oscillations such as uncontrolled speed adjustment in the operation of hydropower station due to small changes of initial values. 展开更多
关键词 nonlinear hydro-turbine governing systems hidden attractors basin of attraction Lyapunov exponent spectrum
原文传递
Reliability and validity of the hidden hunger assessment scale in China-revised for high school students
4
作者 Ning Zhang Minao Wang +6 位作者 Yuchen Zhang Huake Cao Yang Yang Yuhang Shi Yang Pei Feixiang Yang Yinan Du 《Global Health Journal》 2023年第2期110-116,共7页
Objective:Hidden hunger remains a severe public health problem that affects millions of people worldwide.In China,challenges related to dietary imbalance and hidden hunger persist.Micronutrient inadequacy deserves mor... Objective:Hidden hunger remains a severe public health problem that affects millions of people worldwide.In China,challenges related to dietary imbalance and hidden hunger persist.Micronutrient inadequacy deserves more attention among adolescents,given its vital role in their growth and development;however,this problem appears to have been largely ignored.High school students,in particular,are often at a high risk of hidden hunger but have limited assessment tools available.Therefore,this study aims to revise the hidden hunger assessment scale for high school students(HHAS-HSS)in China and assess its reliability and validity.Methods:Based on a literature review,expert consultation,pre-experiment,and formal survey,a hidden hunger assessment scale was revised for high school students.The formal survey involved 9336 high school students in 11 of the 16 cities in Anhui Province,China,and 9038 valid questionnaires were collected and included in the analysis.The item analysis,internal consistency reliability,test-retest reliability,content validity,exploratory factor analysis,and confirmatory factor analysis of the HHAS-HSS were examined.Results:The HHAS-HSS included a total of 4 dimensions and 12 items:"vegetables and food diversity"(three items),"fruits and dairy products"(three items),"micronutrient-dense foods"(four items),and"health condition and eating habits"(two items).The results showed a Cronbach's alpha of 0.758,a split-half reliability of 0.829,and a test-retest reliability of o.793,indicating good internal consistency.Using the Bartlett's test and Kaiser-Meyer-Olkin test(KMO)to test the exploratory factor analysis presented a four-factor model of the HHAS-HSS,the KMO0 value was 0.820(P<0.001),which indicated the possibility for factor confirmatory factor analysis.Using the maximum variance rotation method,four factors were obtained,and the cumulative variance explained rate was 57.974%.Confirmatory factor analysis also supported the division of the scale into four dimensions,and the fitting indices were x^(2)=1417.656,x^(2)/df=29.534,goodness-of-fit index=0.974,adjusted goodnessof-fit index=0.958,parsimonious goodness-of-fit index=0.600,normed fit index=0.938,incremental fit index=0.940,Tucker-Lewis index=0.917,comparative fit index=0.939,and root mean square error of approximation=0.056.Except for x^(2)/df,all the indices reached the fitting standard,and the above results showed that the construct validity of the scale reached an acceptable level.Conclusions:The HHAS-HSS has good validity and reliability for Chinese high school students.It is a convenient self-report measure of hidden hunger risk. 展开更多
关键词 hidden hunger Reliability and validity Assessment scale High school student MICRONUTRIENTS
下载PDF
Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud
5
作者 Zaid Abdulsalam Ibrahim Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第7期939-956,共18页
Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems... Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems. Moreover, such systems create security issues whileefficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT datamore secure and reliable in various cloud storage services. Cloud-assisted IoTssuffer from two privacy issues: access policies (public) and super polynomialdecryption times (attributed mainly to complex access structures). We havedeveloped a CP-ABE scheme in alignment with a Hidden HierarchyCiphertext-Policy Attribute-Based Encryption (HH-CP-ABE) access structure embedded within two policies, i.e., public policy and sensitive policy.In this proposed scheme, information is only revealed when the user’sinformation is satisfactory to the public policy. Furthermore, the proposedscheme applies to resource-constrained devices already contracted tasks totrusted servers (especially encryption/decryption/searching). Implementingthe method and keywords search resulted in higher access policy privacy andincreased security. The new scheme introduces superior storage in comparisonto existing systems (CP-ABE, H-CP-ABE), while also decreasing storage costsin HH-CP-ABE. Furthermore, a reduction in time for key generation canalso be noted.Moreover, the scheme proved secure, even in handling IoT datathreats in the Decisional Bilinear Diffie-Hellman (DBDH) case. 展开更多
关键词 Bilinear Diffie-Hellman(DBDH) Internet of Things(IoT) Ciphertext-Policy Attribute-Based Encryption(CP-ABE) hidden Hierarchy CP-ABE(HH-CP-ABE)
下载PDF
Application of"Six Thinking Hats"in the Investigation and Improvement of Hidden Dangers in Food Safety
6
作者 Peng WAN Zhen ZHAO +3 位作者 Guoyan WEN Yunshuang FU Cuizhi LI Zhiyong LU 《Asian Agricultural Research》 2023年第10期20-22,共3页
With the development of economy,people's living standards are constantly improving,and the requirements for food safety are getting higher and higher.The Food Safety Law stipulates that enterprises should implemen... With the development of economy,people's living standards are constantly improving,and the requirements for food safety are getting higher and higher.The Food Safety Law stipulates that enterprises should implement the main responsibility of food safety,and the investigation and improvement of food safety hazards plays an important role in improving the food safety management level of enterprises and reducing food safety risks.This paper combines the innovative thinking mode of six thinking hats with food safety,discusses the application mode of six thinking hats in food safety investigation and improvement,and hopes to improve food safety level through this way. 展开更多
关键词 Six thinking hats Food safety hidden danger investigation and improvement
下载PDF
Hidden Hearing Loss: Causes, Current Knowledge, and Future Directions
7
作者 Alexandra Jalkh 《International Journal of Otolaryngology and Head & Neck Surgery》 2023年第3期107-123,共17页
Introduction: Hidden hearing loss (HHL) is a type of auditory disorder that affects the auditory neural processing and hearing sensitivity in subjects with normal hearing thresholds. Unlike central auditory processing... Introduction: Hidden hearing loss (HHL) is a type of auditory disorder that affects the auditory neural processing and hearing sensitivity in subjects with normal hearing thresholds. Unlike central auditory processing disorders, HHL happens when the cochlea (the peripheral auditory organ) is affected. There are several known risk factors to HHL which includes noise exposure, ototoxic drugs, and peripheral neuropathies, and age. Recent studies have shed light on this type of hearing loss, its etiology, prevalence, and how it can affect the auditory acuity in humans. Methods: This paper covers the current research regarding HHL, its causes, the different mechanisms involved in this disorder, and the diagnosis and potential treatments related to it. We will delve deeply into different researches concerning HHL. 4 articles from 285 were selected focusing on normal hearing individuals with bad speech intelligibility were discussed in this paper. In addition, articles discussing the effects of noise exposure on hearing impaired individuals were not considered as this study solely aims to focus on normal hearing sensitivity individuals with HHL, resulting in 4 articles from 285. Results: Numerous literatures over the decades have suggested that HHL is due to the degeneration of cochlear ribbon synapses, or hair cells synapses without hair cell damage. Their association with HHL was noted several times through this study, whether we were studying the effect of noise exposure, of age, or of ototoxicity. In all cases, no significant hair cell damage was observed, and normal thresholds were recovered. However, a decline in the amplitude of Auditory Brainstem Response (ABR) peak I from auditory nerve (AN) responses in noise exposed subjects and a decline in compound action potential (CAP) was measured when certain drugs were applied to the round window of Guinea pigs. Conclusion: Most studies, have proven that cochlear synaptophysin is the major contributor to noise induced, age, and ototoxic related HHL. There are several audiometric tests that were used to help identify HHL including Puretone audiometry in background noise, ABR, CAP, Distortion Product Otoacoustic Emission (DPOAE). 展开更多
关键词 hidden Hearing Loss Speech Testing Speech Intelligibility Noise Induced Hearing Loss OTOTOXICITY Schwan’s Cells Ablation
下载PDF
基于标记树对象抽取技术的Hidden Web获取研究 被引量:9
8
作者 宋晖 张岭 +1 位作者 叶允明 马范援 《计算机工程与应用》 CSCD 北大核心 2002年第23期9-12,24,共5页
目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该... 目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该文提出了一套检索HiddenWeb信息的方法,给出了系统的框架结构,并详细讨论了实现的关键技术。系统采用新的基于标记树的对象抽取(Tag-Tree-basedObjectExtraction)方法自动地从Web页面中抽取HiddenWeb信息,然后在此基础上给出了结构化的HiddenWeb信息查询算法。文章最后对实验结果进行了讨论。 展开更多
关键词 标记树 对象抽取 hiddenWeb 互联网 搜索引擎 信息检索 结构化查询 数据库
下载PDF
基于启发式查询词选择算法的Hidden Web获取研究 被引量:1
9
作者 姚全珠 杨增辉 +1 位作者 张楠 田元 《计算机工程与应用》 CSCD 北大核心 2007年第34期174-176,203,共4页
Hidden Web因为其隐蔽性而难以直接抓取,因此成为信息检索研究的一个新领域。提出了一种获取Hidden Web信息的方法,讨论了实现的关键技术。通过设计提出的启发式查询词选择算法,提高了抓取的效率。实验证明了该模型和算法的有效性。
关键词 信息检索 hidden WEB 爬虫 启发式算法
下载PDF
民航主题Hidden-Web爬虫的设计与实现 被引量:1
10
作者 张校慧 徐彬 +1 位作者 陈国强 陈珊 《计算机应用与软件》 CSCD 北大核心 2008年第7期187-189,共3页
分析了现今搜索引擎技术在民航主题Hidden-Web获取方面的缺陷,以此为鉴设计并实现了一个民航主题Hidden-Web爬虫。此爬虫使用主题分类等相关技术发现并抓取民航主题Hidden-Web所对应的前台Form,生成相应的Form库,然后利用启发式规则对F... 分析了现今搜索引擎技术在民航主题Hidden-Web获取方面的缺陷,以此为鉴设计并实现了一个民航主题Hidden-Web爬虫。此爬虫使用主题分类等相关技术发现并抓取民航主题Hidden-Web所对应的前台Form,生成相应的Form库,然后利用启发式规则对Form库中的Form进行填写并搜集含有匹配结果的页面集。实验证明此爬虫的性能令人满意且对其它Hidden-Web的应用研究具有借鉴意义。 展开更多
关键词 hidden-Web FORM 民航 爬虫
下载PDF
Hidden Web信息获取 被引量:3
11
作者 陈珂 陈小英 徐科 《计算机时代》 2007年第5期54-56,共3页
如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词。由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面。然而,研究表明,由Hidden Web站... 如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词。由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面。然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值。文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息。 展开更多
关键词 hidden Web hidden WEB爬虫 静态链接 搜索引擎 采样策略
下载PDF
Study on Problems and Countermeasures of English Hidden Curriculum Construction in Higher Vocational Colleges in the Era of “Internet Plus” 被引量:1
12
作者 谢丹 《海外英语》 2017年第7期245-246,共2页
As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse thei... As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse their enthusiasm,initiative and creativity in learningEnglish.This paper analyzes the problems of English hidden curriculum construction in higher vocational colleges under the back-ground o"fInternet plus",and puts forward some corresponding countermeasures to bring the role of college English hidden curriculuminto full play. 展开更多
关键词 "Internet plus" higher vocational colleges construction of English hidden curriculum problems and countermeasures
下载PDF
Extremely hidden multi-stability in a class of two-dimensional maps with a cosine memristor
13
作者 张丽萍 刘洋 +3 位作者 魏周超 姜海波 吕伟鹏 毕勤胜 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第10期331-340,共10页
We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynami... We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynamical behaviors of these maps are studied and investigated using different numerical tools, including phase portrait, basins of attraction,bifurcation diagram, and Lyapunov exponents. The two-parameter bifurcation analysis of the memristive map is carried out to reveal the bifurcation mechanism of its dynamical behaviors. Based on our extensive simulation studies, the proposed memristive maps can produce hidden periodic, chaotic, and hyper-chaotic attractors, exhibiting extremely hidden multistability, namely the coexistence of infinite hidden attractors, which was rarely observed in memristive maps. Potentially,this work can be used for some real applications in secure communication, such as data and image encryptions. 展开更多
关键词 two-dimensional maps memristive maps hidden attractors bifurcation analysis extremely hidden multi-stability
原文传递
Analysis and implementation of new fractional-order multi-scroll hidden attractors
14
作者 崔力 雒文辉 欧青立 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第2期203-210,共8页
To improve the complexity of chaotic signals,in this paper we first put forward a new three-dimensional quadratic fractional-order multi-scroll hidden chaotic system,then we use the Adomian decomposition algorithm to ... To improve the complexity of chaotic signals,in this paper we first put forward a new three-dimensional quadratic fractional-order multi-scroll hidden chaotic system,then we use the Adomian decomposition algorithm to solve the proposed fractional-order chaotic system and obtain the chaotic phase diagrams of different orders,as well as the Lyaponov exponent spectrum,bifurcation diagram,and SE complexity of the 0.99-order system.In the process of analyzing the system,we find that the system possesses the dynamic behaviors of hidden attractors and hidden bifurcations.Next,we also propose a method of using the Lyapunov exponents to describe the basins of attraction of the chaotic system in the matlab environment for the first time,and obtain the basins of attraction under different order conditions.Finally,we construct an analog circuit system of the fractional-order chaotic system by using an equivalent circuit module of the fractional-order integral operators,thus realizing the 0.9-order multi-scroll hidden chaotic attractors. 展开更多
关键词 fractional order hidden attractor hidden bifurcation basins of attraction circuit implementation
原文传递
Hidden Animals
15
作者 陆政 《语言教育》 1997年第3期85-,共1页
关键词 SENTENCE REALLY never STRANGE letters hidden SHOOT hidden ANIMALS VISITORS twenty
下载PDF
Hidden Markov model based epileptic seizure detection using tunable Q wavelet transform 被引量:2
16
作者 Deba Prasad Dash Maheshkumar H Kolekar 《The Journal of Biomedical Research》 CAS CSCD 2020年第3期170-179,共10页
Epilepsy is one of the most prevalent neurological disorders affecting 70 million people worldwide.The present work is focused on designing an efficient algorithm for automatic seizure detection by using electroenceph... Epilepsy is one of the most prevalent neurological disorders affecting 70 million people worldwide.The present work is focused on designing an efficient algorithm for automatic seizure detection by using electroencephalogram(EEG) as a noninvasive procedure to record neuronal activities in the brain.EEG signals' underlying dynamics are extracted to differentiate healthy and seizure EEG signals.Shannon entropy,collision entropy,transfer entropy,conditional probability,and Hjorth parameter features are extracted from subbands of tunable Q wavelet transform.Efficient decomposition level for different feature vector is selected using the Kruskal-Wallis test to achieve good classification.Different features are combined using the discriminant correlation analysis fusion technique to form a single fused feature vector.The accuracy of the proposed approach is higher for Q=2 and J=10.Transfer entropy is observed to be significant for different class combinations.Proposed approach achieved 100% accuracy in classifying healthy-seizure EEG signal using simple and robust features and hidden Markov model with less computation time.The proposed approach efficiency is evaluated in classifying seizure and non-seizure surface EEG signals.The system has achieved 96.87% accuracy in classifying surface seizure and nonseizure EEG segments using efficient features extracted from different J level. 展开更多
关键词 ELECTROENCEPHALOGRAM EPILEPSY SEIZURE tunable Q wavelet transform ENTROPY hidden Markov model
下载PDF
Research on Hidden Failure Reliability Modeling of Electric Power System Protection 被引量:2
17
作者 Jingjing Zhang Ming Ding +1 位作者 Xianjun Qi Yi Guo 《Energy and Power Engineering》 2013年第4期1377-1382,共6页
Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection functi... Aiming at digital relay protection system, a novel hidden failure Markov reliability model is presented for a single main protection and double main protection systems according to hidden failure and protection function under Condition-Based Maintenance (CBM) circumstance and reliability indices such as probability of protection system hidden failure state are calculated. Impacts of different parameters (containing impacts of human errors) to hidden failure state probability and the optimal measures to improve reliability by variable parameter method are also analyzed. It’s demonstrated here that: Compared to a single main protection, double main protection system has an increased hidden failure probability, thus the real good state probability decreases, two main protections’ reliability must be improved at the same time, so configuration of the whole protection system for the component being protected can’t be complicated. Through improving means of on-line self-checking and monitoring system in digital protection system and human reliability, the real application of CBM can decrease hidden failure state probability. Only through this way can we assure that the protection systems work in good state. It has a certain reference value to protection system reliability engineering. 展开更多
关键词 Double MAIN Protection System hidden FAILURE MARKOV Method Condition-Based Maintenance (CBM) Human ERROR
下载PDF
Hidden attractors in a new fractional-order discrete system: Chaos, complexity, entropy, and control 被引量:2
18
作者 Adel Ouannas Amina Aicha Khennaoui +2 位作者 Shaher Momani Viet-Thanh Pham Reyad El-Khazali 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第5期174-181,共8页
This paper studies the dynamics of a new fractional-order discrete system based on the Caputo-like difference operator.This is the first study to explore a three-dimensional fractional-order discrete chaotic system wi... This paper studies the dynamics of a new fractional-order discrete system based on the Caputo-like difference operator.This is the first study to explore a three-dimensional fractional-order discrete chaotic system without equilibrium.Through phase portrait,bifurcation diagrams,and largest Lyapunov exponents,it is shown that the proposed fractional-order discrete system exhibits a range of different dynamical behaviors.Also,different tests are used to confirm the existence of chaos,such as 0-1 test and C0 complexity.In addition,the quantification of the level of chaos in the new fractional-order discrete system is measured by the approximate entropy technique.Furthermore,based on the fractional linearization method,a one-dimensional controller to stabilize the new system is proposed.Numerical results are presented to validate the findings of the paper. 展开更多
关键词 discrete chaos discrete fractional calculus hidden attractor
原文传递
Prediction of Potential Disease-Associated MicroRNAs Based on Hidden Conditional Random Field 被引量:1
19
作者 Maozu Guo Shuang Cheng +2 位作者 Chunyu Wang Xiaoyan Liu Yang Liu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2018年第1期57-66,共10页
MicroRNAs( miRNAs) are reported to be associated with various diseases. The identification of disease-related miRNAs would be beneficial to the disease diagnosis and prognosis. However,in contrast with the widely avai... MicroRNAs( miRNAs) are reported to be associated with various diseases. The identification of disease-related miRNAs would be beneficial to the disease diagnosis and prognosis. However,in contrast with the widely available expression profiling, the limited knowledge of molecular function restrict the development of previous methods based on network similarity measure. To construct reliable training data,the decision fusion method is used to prioritize the results of existing methods. After that,the performance of decision fusion method is validated. Furthermore,in consideration of the long range dependencies of successive expression values,Hidden Conditional Random Field model( HCRF) is selected and applied to miRNA expression profiling to infer disease-associated miRNAs. The results show that HCRF achieves superior performance and outperforms the previous methods. The results also demonstrate the power of using expression profiling for discovering disease-associated miRNAs. 展开更多
关键词 expression PROFILING hidden CONDITIONAL RANDOM field miRNA-disease association network
下载PDF
Hidden Attractors in a Delayed Memristive Differential System with Fractional Order and Chaos Synchronization 被引量:1
20
作者 Dawei Ding Yecui Weng Nian Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2020年第1期67-75,共9页
As an important research branch,memristor has attracted a range of scholars to study the property of memristive chaotic systems.Additionally,time⁃delayed systems are considered a significant and newly⁃developing field... As an important research branch,memristor has attracted a range of scholars to study the property of memristive chaotic systems.Additionally,time⁃delayed systems are considered a significant and newly⁃developing field in modern research.By combining memristor and time⁃delay,a delayed memristive differential system with fractional order is proposed in this paper,which can generate hidden attractors.First,we discussed the dynamics of the proposed system where the parameter was set as the bifurcation parameter,and showed that with the increase of the parameter,the system generated rich chaotic phenomena such as bifurcation,chaos,and hypherchaos.Then we derived adequate and appropriate stability criteria to guarantee the system to achieve synchronization.Lastly,examples were provided to analyze and confirm the influence of parameter a,fractional order q,and time delayτon chaos synchronization.The simulation results confirm that the chaotic synchronization is affected by a,q andτ. 展开更多
关键词 fractional order memristive time⁃delay hidden attractors chaos synchronization
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部