GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Material
Person/Organisation
Language
Years
  • 1
    Online Resource
    Online Resource
    Mary Ann Liebert Inc ; 2019
    In:  Journal of Ocular Pharmacology and Therapeutics Vol. 35, No. 3 ( 2019-04), p. 161-167
    In: Journal of Ocular Pharmacology and Therapeutics, Mary Ann Liebert Inc, Vol. 35, No. 3 ( 2019-04), p. 161-167
    Type of Medium: Online Resource
    ISSN: 1080-7683 , 1557-7732
    Language: English
    Publisher: Mary Ann Liebert Inc
    Publication Date: 2019
    detail.hit.zdb_id: 2049089-6
    SSG: 15,3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Informa UK Limited ; 2021
    In:  Therapeutics and Clinical Risk Management Vol. Volume 17 ( 2021-05), p. 489-496
    In: Therapeutics and Clinical Risk Management, Informa UK Limited, Vol. Volume 17 ( 2021-05), p. 489-496
    Type of Medium: Online Resource
    ISSN: 1178-203X
    Language: English
    Publisher: Informa UK Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2180573-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Angle Publishing Co., Ltd. ; 2022
    In:  電腦學刊 Vol. 33, No. 5 ( 2022-10), p. 049-060
    In: 電腦學刊, Angle Publishing Co., Ltd., Vol. 33, No. 5 ( 2022-10), p. 049-060
    Abstract: 〈p〉Aiming at the problem of large amount of intelligent operation and maintenance KPI data and poor clustering effect, this paper proposes a fast KPI clustering method based on the IP-Kshape (IAE-PAA-Kshape) algorithm. First design an improved autoencoder algorithm (IAE), add a convolutional layer and a two-way LSTM network layer to the standard autoencoder, to achieve smooth denoising of KPI data and timing feature extraction; then the KPI data features are clustered based on the PAA-Kshape algorithm, and the PAA algorithm is used to perform dimension compression and Kshape algorithm to solve the drift problem of KPI sequences, which improves the clustering speed and accuracy of KPI data. Through experimental comparative analysis, it is proved that the method proposed in this paper can better realize the rapid clustering of KPI data, and the time efficiency and accuracy are better than traditional machine learning or deep learning methods.〈/p〉 〈p〉 〈/p〉
    Type of Medium: Online Resource
    ISSN: 1991-1599 , 1991-1599
    Uniform Title: A Fast Clustering Method of KPI Data Based on IP-Kshape Algorithm
    Language: Unknown
    Publisher: Angle Publishing Co., Ltd.
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: American Journal of Surgery and Clinical Case Reports, Annals of Clinical and Medical Case Reports, Vol. 05, No. 13 ( 2022), p. 01-06
    Abstract: Objective: By carrying out research-based quality control circle activities, a continuous nursing model for hospitalized veteran cadres was built, which improved quality of life and compliance. Methods: A “Ji Dong Circle” quality control circle group was established to analyze the current situation, survey data, mine key points, and formulate strategies from three levels (hospital-cadre’s sanatorium-family), according to the operation steps of the subject research quality control circle. The quality control circle group was implemented from three aspects: the establishment of a three-level linkage management mode of “hospital-cadre’s sanatorium-family;” the establishment of “three more” nursing training modes; and the operation of a continuous nursing service system. Results: After implementation of the quality control circle, the level of relevant nursing professional knowledge among the nursing staff, the level of first aid skills among medical staff in cadre’s sanatorium, the coverage rate of telephone follow-up, nursing satisfaction, medication compliance of veteran cadres, and the living nursing operation level of caregivers were significantly improved compared to those before implementation (P 〈 0.05). Conclusion: The research-based quality control circle activity constructed a new three-level linkage “hospital-cadre’s sanatorium-family” continuous nursing model for hospitalized veteran cadres that is guided by the needs of patients. At the same time, it has implemented the national medical security policy for the elderly, effectively improved the compliance and nursing satisfaction of the elderly cadres, and established the brand benefit of hospital elderly care services.
    Type of Medium: Online Resource
    ISSN: 2689-8268
    URL: Issue
    Language: Unknown
    Publisher: Annals of Clinical and Medical Case Reports
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-10-15), p. 1-7
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-10-15), p. 1-7
    Abstract: Information security is the basis of economic development, information construction, and the protection of people’s and national interest. In this paper, the performance of reconfigurable intelligent surface (RIS)-assisted mixed dual-hop free-space optical-radio frequency (FSO-RF) communication systems is studied and analyzed to ensure the safe transmission of information. In this scheme, it is assumed that the atmospheric turbulence in the fading of the FSO channel follows the exponentiated Weibull distribution model and the fading of the RF channel follows the Rayleigh distribution model. Based on the mathematical function, the probability density function and cumulative distribution function of RIS-assisted mixed dual-hop FSO-RF communication systems are derived. Then, the expression of outage probability and the bit error rate of the system are derived from the channel statistics. Finally, the analysis results are verified by Monte Carlo simulation, and the effects of different parameters on the system performance are analyzed. The simulation results show that the atmospheric turbulence parameters, channel distance of FSO, intensity of atmospheric turbulence, and number of reflectors all affect the system performance.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-3-9), p. 1-13
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-3-9), p. 1-13
    Abstract: Socialnet becomes an important component in real life, drawing a lot of study issues of security and safety. Recently, for the features of graph structure in socialnet, adversarial attacks on node classification are exposed, and automatic attack methods such as fast gradient attack (FGA) and NETTACK are developed for per-node attacks, which can be utilized for multinode attacks in a sequential way. However, due to the overlook of perturbation influence between different per-node attacks, the above sequential method does not guarantee a global attack success rate for all target nodes, under a fixed budget of perturbation. In this paper, we propose a parallel adversarial attack framework on node classification. We redesign new loss function and objective function for nonconstraint and constraint perturbations, respectively. Through constructing intersection and supplement mechanisms of perturbations, we then integrate node filtering-based P-FGA and P-NETTACK in a unified framework, finally realizing parallel adversarial attacks. Experiments on politician socialnet dataset Polblogs with detailed analysis are conducted to show the effectiveness of our approach.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-04-19), p. 1-18
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-04-19), p. 1-18
    Abstract: Wearable medical devices rely on the human body to form a small LAN around the human body, called body area network (BAN). Users can use these devices to monitor the changes of various body indicators in real time. The physiological data involved in this process belongs to personal privacy. Therefore, the security requirements of BAN are relatively high, and its current research focus is on authentication mechanisms. To meet the requirements of security and resource consumption of BAN, this paper proposes a lightweight identity authentication mechanism that meets the characteristics of BAN resource constraints. Based on the characteristics of BAN, a simple and mature star topology structure is applied to establish the network model of BAN. For the human body in normal situations and emergencies, the corresponding authentication mechanism and encryption and decryption method of physiological data are designed by using the physical unclonable function (PUF) and cloud database, physiological data, and cross-correlation algorithm. Furthermore, the formal and informal security analysis of the designed authentication mechanism proves that the authentication mechanism designed in this paper has certain security, and the lightweight authentication mechanism is simulated and evaluated. The experimental results show that compared with the benchmarking mechanism, the authentication mechanism designed in this paper solves more security problems and has certain advantages in terms of calculation cost, communication cost, and energy cost.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-12-1), p. 1-16
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-12-1), p. 1-16
    Abstract: With the development of the Internet, user comments produced an unprecedented impact on information acquisition, goods purchase, and other aspects. For example, the user comments can quickly render a topic the focus of discussion in social networks. It can promote the sales of goods in e-commerce, and it influences the ratings of books, movies, or albums. Among these network applications and services, “astroturfing,” a kind of online suspicious behavior, can generate abnormal, damaging, and even illegal behaviors in cyberspace that mislead public perception and bring a bad effect on Internet users and society. Hence, the manner of detecting and combating astroturfing behavior has become highly urgent, attracting interest from researchers both from information technology and sociology. In the current paper, we restudy it mainly from the perspective of information technology, summarize the latest research findings of astroturfing detection, analyze the astroturfing feature, classify the machine learning-based detection methods and evaluation criteria, and introduce the main applications. Different from the previous surveys, we also discuss the new future directions of astroturfing detection, such as cross-domain astroturfing detection and user privacy protection.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Proceedings of the National Academy of Sciences ; 2018
    In:  Proceedings of the National Academy of Sciences Vol. 115, No. 16 ( 2018-04-17), p. 4218-4222
    In: Proceedings of the National Academy of Sciences, Proceedings of the National Academy of Sciences, Vol. 115, No. 16 ( 2018-04-17), p. 4218-4222
    Abstract: Reactive oxygen species formed within the mammalian cell can produce 8-oxo-7,8-dihydroguanine (8-oxoG) in mRNA, which can cause base mispairing during gene expression. Here we found that administration of 8-oxoGTP in MTH1-knockdown cells results in increased 8-oxoG content in mRNA. Under this condition, an amber mutation of the reporter luciferase is suppressed. Using second-generation sequencing techniques, we found that U-to-G changes at preassigned sites of the luciferase transcript increased when 8-oxoGTP was supplied. In addition, an increased level of 8-oxoG content in RNA induced the accumulation of aggregable amyloid β peptides in cells expressing amyloid precursor protein. Our findings indicate that 8-oxoG accumulation in mRNA can alter protein synthesis in mammalian cells. Further work is required to assess the significance of these findings under normal physiological conditions.
    Type of Medium: Online Resource
    ISSN: 0027-8424 , 1091-6490
    RVK:
    RVK:
    Language: English
    Publisher: Proceedings of the National Academy of Sciences
    Publication Date: 2018
    detail.hit.zdb_id: 209104-5
    detail.hit.zdb_id: 1461794-8
    SSG: 11
    SSG: 12
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Hindawi Limited ; 2020
    In:  Security and Communication Networks Vol. 2020 ( 2020-12-30), p. 1-11
    In: Security and Communication Networks, Hindawi Limited, Vol. 2020 ( 2020-12-30), p. 1-11
    Abstract: The Internet is more and more integrated into people’s life; because of the complexity and fragility of the network environment, network attack presents a more and more serious trend. Application Layer DDoS (AL-DDoS) attack is the most complex form of DDoS attack, which is hindering the availability for the legitimate users by taking up a large number of requests of web server. The paper introduced the concept of behavior utility to portray the network. The concept of attack and defense utility was defined by a specific property which was the manifestation of the network risk after the offset of attack and defense. In the utility model, traffic metrics were mapped to the multidimensional parallelotope in the Euclidean space to express as a diagonal matrix. To determine the threshold status, the defense strategies of load balancing and limiting the maximum number of connections were used with different attack scales. Finally, the attack and defense utility value was calculated to evaluate the network risk level. The proposed method can master the capacity of network system against each attack means and the defense capability of network system. Its availability and accuracy are verified by comparing with the relevant works.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2020
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...