GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Shanghai Institute of Optics and Fine Mechanics ; 2016
    In:  Chinese Optics Letters Vol. 14, No. 11 ( 2016), p. 110201-110204
    In: Chinese Optics Letters, Shanghai Institute of Optics and Fine Mechanics, Vol. 14, No. 11 ( 2016), p. 110201-110204
    Type of Medium: Online Resource
    ISSN: 1671-7694
    Uniform Title: Control of molecular excitation during the plasma generation of a femtosecond laser pulse
    URL: Issue
    Language: English , Chinese
    Publisher: Shanghai Institute of Optics and Fine Mechanics
    Publication Date: 2016
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    In: Environmental Science & Technology, American Chemical Society (ACS), Vol. 56, No. 2 ( 2022-01-18), p. 770-778
    Type of Medium: Online Resource
    ISSN: 0013-936X , 1520-5851
    RVK:
    Language: English
    Publisher: American Chemical Society (ACS)
    Publication Date: 2022
    detail.hit.zdb_id: 280653-8
    detail.hit.zdb_id: 1465132-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    In: Cell Death & Disease, Springer Science and Business Media LLC, Vol. 10, No. 6 ( 2019-06-11)
    Abstract: Targeting autophagy may serve as a promising strategy for cancer therapy. Ganoderma lucidum polysaccharide (GLP) has been shown to exert promising anti-cancer effects. However, the underlying mechanisms remain elusive. Whether GLP regulates autophagy in cancer has never been reported. In this study, GLP induced the initiation of autophagy in colorectal cancer (CRC) HT-29 and HCT116 cells, as evidenced by enhanced level of LC3-II protein, GFP-LC3 puncta, and increased formation of double membrane vacuoles. However, GLP treatment caused marked increase of p62 expression. Addition of late stage autophagy inhibitor, chloroquine (CQ), further enhanced LC3-II and p62 level, as well as increased autophagosome accumulation, suggesting a blockage of autophagic flux by GLP in CRC cells. We then found GLP blocked autophagosome and lysosome fusion as determined by mRFP-GFP-LC3 colocalization analysis. Mechanistic study revealed that GLP-induced disruption of autophagosome-lysosome fusion is due to reduced lysosome acidification and lysosomal cathepsin activities. Cell viability and flow cytometry assays revealed that GLP-induced autophagosome accumulation is responsible for GLP-induced apoptosis in CRC cells. In line with this, inhibition of autophagy initiation by 3-methyladenine (3-MA), an early stage autophagy inhibitor, attenuated GLP-induced apoptosis. In contrast, suppression of autophagy at late stage by CQ enhanced the anti-cancer effect of GLP. Furthermore, we demonstrated that GLP-induced autophagosome accumulation and apoptosis is mediated via MAPK/ERK activation. Finally, GLP inhibited tumor growth and also inhibited autophagic flux in vivo. These results unveil new molecular mechanism underlying anti-cancer effects of GLP, suggesting that GLP is a potent autophagy inhibitor and might be useful in anticancer therapy.
    Type of Medium: Online Resource
    ISSN: 2041-4889
    Language: English
    Publisher: Springer Science and Business Media LLC
    Publication Date: 2019
    detail.hit.zdb_id: 2541626-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Agriculture, MDPI AG, Vol. 12, No. 10 ( 2022-09-30), p. 1583-
    Abstract: In order to study the detection effect of cotton boll opening after spraying defoliant, and to solve the problem of low efficiency of traditional manual detection methods for the use effect of cotton defoliant, this study proposed a cotton detection method improved YOLOv5x+ algorithm. Convolution Attention Module (CBAM) was embedded after Conv to enhance the network’s feature extraction ability, suppress background information interference, and enable the network to focus better on cotton targets in the detection process. At the same time, the depth separable convolution (DWConv) was used to replace the ordinary convolution (Conv) in the YOLOv5x model, reducing the convolution kernel parameters in the algorithm, reducing the amount of calculation, and improving the detection speed of the algorithm. Finally, the detection layer was added to make the algorithm have higher accuracy in detecting small size cotton. The test results show that the accuracy rate P (%), recall rate R (%), and mAP value (%) of the improved algorithm reach 90.95, 89.16, and 78.47 respectively, which are 8.58, 8.84, and 5.15 higher than YOLOv5x algorithm respectively, and the convergence speed is faster, the error is smaller, and the resolution of cotton background and small target cotton is improved, which can meet the detection of cotton boll opening effect after spraying defoliant.
    Type of Medium: Online Resource
    ISSN: 2077-0472
    Language: English
    Publisher: MDPI AG
    Publication Date: 2022
    detail.hit.zdb_id: 2651678-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    In: Northern European Journal of Language Technology, Linkoping University Electronic Press, Vol. 9, No. 1 ( 2023-04-08)
    Abstract: Data augmentation is an important method for evaluating the robustness of and enhancing the diversity of training data for natural language processing (NLP) models. In this paper, we present NL-Augmenter, a new participatory Python-based natural language (NL) augmentation framework which supports the creation of transformations (modifications to the data) and filters (data splits according to specific features). We describe the framework and an initial set of 117 transformations and 23 filters for a variety of NL tasks annotated with noisy descriptive tags. The transformations incorporate noise, intentional and accidental human mistakes, socio-linguistic variation, semantically-valid style, syntax changes, as well as artificial constructs that are unambiguous to humans. We demonstrate the efficacy of NL-Augmenter by using its transformations to analyze the robustness of popular language models. We find different models to be differently challenged on different tasks, with quasi-systematic score decreases. The infrastructure, datacards, and robustness evaluation results are publicly available on GitHub for the benefit of researchers working on paraphrase generation, robustness analysis, and low-resource NLP. El aumento de datos es un método importante para evaluar la solidez y mejorar la diversidad del entrenamiento datos para modelos de procesamiento de lenguaje natural (NLP). इस लेख में, हम एनएल-ऑगमेंटर का प्रस्ताव करते हैं - एक नया भागी- दारी पूर्वक, पायथन में बनाया गया, लैंग्वेज (एनएल) ऑग्मेंटेशन फ्रेमवर्क जो ट्रांसफॉर्मेशन (डेटा में बदलाव करना) और फीलटर (फीचर्स के अनुसार डेटा का भाग करना) के नीरमान का समर्थन करता है।. 我们描述了NL-Augmenter框架及其初步包含的117种转换和23个过滤器,并 大致标注分类了一系列可适配的自然语言任务. این دگرگونی ها شامل نویز، اشتباهات عمدی و تصادفی انسانی، تنوع اجتماعی-زبانی، سبک معنایی معتبر، تغییرات نحوی و همچنین ساختارهای مصنوعی است که برای انسان ها مبهم است. NL-Augmenterpa allin kaynintam qawachiyku, tikrakuyninku- nata servichikuspayku, chaywanmi qawariyku modelos de lenguaje popular nisqapa allin takyasqa kayninta. Kami menemukan model yang berbeda ditantang secara berbeda pada tugas yang berbeda, dengan penurunan skor kuasi-sistematis. Infrastruktur, kartu data, dan hasil evaluasi ketahanan dipublikasikan tersedia secara gratis di GitHub untuk kepentingan para peneliti yang mengerjakan pembuatan parafrase, analisis ketahanan, dan NLP sumber daya rendah.
    Type of Medium: Online Resource
    ISSN: 2000-1533
    URL: Issue
    Language: Unknown
    Publisher: Linkoping University Electronic Press
    Publication Date: 2023
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2020
    In:  IEEE Transactions on Power Delivery Vol. 35, No. 6 ( 2020-12), p. 2750-2761
    In: IEEE Transactions on Power Delivery, Institute of Electrical and Electronics Engineers (IEEE), Vol. 35, No. 6 ( 2020-12), p. 2750-2761
    Type of Medium: Online Resource
    ISSN: 0885-8977 , 1937-4208
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2020
    detail.hit.zdb_id: 2027539-0
    detail.hit.zdb_id: 165807-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    In: Composites Communications, Elsevier BV, Vol. 42 ( 2023-10), p. 101687-
    Type of Medium: Online Resource
    ISSN: 2452-2139
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2023
    detail.hit.zdb_id: 2866635-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    MDPI AG ; 2020
    In:  Applied Sciences Vol. 10, No. 11 ( 2020-06-10), p. 4015-
    In: Applied Sciences, MDPI AG, Vol. 10, No. 11 ( 2020-06-10), p. 4015-
    Abstract: At present, embedded devices have become a part of people’s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stateful; (2) the communication between the web front-end and the device is encrypted or encoded; and (3) the conditional constraints of programs in the device reduce the depth and breadth of fuzz testing. To address these challenges, we propose a new type of gray-box fuzz testing framework in this paper, called EWVHunter, which is mainly used to find authentication bypass and command injection vulnerabilities in embedded devices. The key idea in this paper is based on the observation that most embedded devices are controlled through the web front-end. Such embedded devices often contain rich information in the communication protocol between the web front-end and device. Therefore, by filling data at the input source on the web front-end and reusing web front-end program logic, we can effectively solve the impact of the stateful network protocol and communication data encryption on fuzzing without relying on any knowledge about the communication protocol. Additionally, we use firmware information extraction to enhance EWVHunter so that it can detect vulnerabilities in deep layer codes and hidden interfaces. In our research, we implemented EWVHunter and evaluated 8 real-world embedded devices, and our approach identified 12 vulnerabilities (including 7 zero-days), which affect a total of 31,996 online devices.
    Type of Medium: Online Resource
    ISSN: 2076-3417
    Language: English
    Publisher: MDPI AG
    Publication Date: 2020
    detail.hit.zdb_id: 2704225-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    In: Complexity, Hindawi Limited, Vol. 2022 ( 2022-4-28), p. 1-10
    Abstract: Image-based crowd counting has extremely important applications in public safety issues. Most of the previous studies focused on extremely dense crowds. However, as the number of webcams increases, a crowd with extremely high density can obtain less error by summing the images of multiple close-range webcams, but there are still some problems such as heavy occlusions and large-scale variation. To solve the above problems, this paper proposes a new type of multibranch neural network with a compensator, in which features are extracted through multibranch subnetworks of different scales. The weights between the branches are adjusted by the compensator, and the captured features are distinguished among different branches. To avoid learning nearly the same features in each branch and reducing the training deviation, the dataset is labeled with head scale, and the adaptive grading loss function is used to calculate the estimated loss of the subregions. The experimental results show that the accuracy of the network proposed in this paper is about 10% higher than that of the comparison network.
    Type of Medium: Online Resource
    ISSN: 1099-0526 , 1076-2787
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2004607-8
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Wiley ; 2020
    In:  IEEJ Transactions on Electrical and Electronic Engineering Vol. 15, No. 12 ( 2020-12), p. 1740-1750
    In: IEEJ Transactions on Electrical and Electronic Engineering, Wiley, Vol. 15, No. 12 ( 2020-12), p. 1740-1750
    Abstract: A high‐voltage direct‐current circuit breaker is a key equipment to construct a flexible direct current transmission system. Most of the existing design schemes have some shortcomings such as slow fault‐breaking speed, poor current‐limiting effect, large capacity of the arrester, and long reclosing operation time. To solve the above problems, this paper proposes an H‐type high‐voltage direct current circuit breaker with a current‐limiting function. The current‐limiting inductance is put into operation by judging the fault condition. It has good current‐limiting ability in the process of fault‐breaking and can maintain the dynamic performance of the power grid in the normal operation of the system. It has the advantages of fast fault‐breaking speed, buffered energy consumption, early separation of fault points, and small capacity of the arrester. During reclosing operation, the transfer branch can be turned on at no‐voltage. The different working states in the process of fault‐breaking are analyzed theoretically based on the description of the topological structure and working principle. Finally, using the PSCAD/EMTDC simulation platform, the functional verification and system verification of fault‐breaking and the reclosing operation process is conducted. Compared with the typical scheme, the simulation analysis shows the effectiveness and applicability of the function of fast fault‐breaking and fault current‐limiting. © 2020 Institute of Electrical Engineers of Japan. Published by Wiley Periodicals LLC.
    Type of Medium: Online Resource
    ISSN: 1931-4973 , 1931-4981
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2020
    detail.hit.zdb_id: 2241861-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...