Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hindawi Limited  (17)
Type of Medium
Publisher
  • Hindawi Limited  (17)
Language
Years
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Mobile Information Systems Vol. 2022 ( 2022-1-18), p. 1-9
    In: Mobile Information Systems, Hindawi Limited, Vol. 2022 ( 2022-1-18), p. 1-9
    Abstract: The optimization of microgrid is an important part of smart grid. The global energy consumption is seriously greater than the energy it has, and the environmental pollution brought by it should not be underestimated. If we want to reduce their impact, introducing the optimization of microgrid is a good solution. Short-term load forecasting is a very important prerequisite for microgrid optimization, which lays a solid foundation for the realization of the development goal of environmental protection and the improvement of the economic benefits of microgrid. In this paper, a Multi-PSO-SVM forecasting model is proposed to forecast the actual load. By simulating four prediction models with three different samples, we can see that the average predicted value and actual load value of Multi-PSO-SVM algorithm in the three different samples are almost less than 10 MV. Compared with the other three algorithms, Multi-PSO-SVM is superior in accurately predicting the load value at each time point, which provides important conditions for the success of microgrid optimization.
    Type of Medium: Online Resource
    ISSN: 1875-905X , 1574-017X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2187808-0
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Mathematical Problems in Engineering Vol. 2018 ( 2018-07-10), p. 1-13
    In: Mathematical Problems in Engineering, Hindawi Limited, Vol. 2018 ( 2018-07-10), p. 1-13
    Abstract: The attack graph (AG) is an abstraction technique that reveals the ways an attacker can use to leverage vulnerabilities in a given network to violate security policies. The analyses developed to extract security-relevant properties are referred to as AG-based security evaluations. In recent years, many evaluation approaches have been explored. However, they are generally limited to the attacker’s “monotonicity” assumption, which needs further improvements to overcome the limitation. To address this issue, the stochastic mathematical model called absorbing Markov chain (AMC) is applied over the AG to give some new insights, namely, the expected success probability of attack intention (EAIP) and the expected attack path length (EAPL). Our evaluations provide the preferred mitigating target hosts and the vulnerabilities patching prioritization of middle hosts. Tests on the public datasets DARPA2000 and Defcon’s CTF23 both verify that our evaluations are available and reliable.
    Type of Medium: Online Resource
    ISSN: 1024-123X , 1563-5147
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2014442-8
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    In: Evidence-Based Complementary and Alternative Medicine, Hindawi Limited, Vol. 2013 ( 2013), p. 1-10
    Abstract: Skimmin is one of the major pharmacologically active molecules present in Hydrangea paniculata , a medical herb used in the traditional Chinese medicine as an anti-inflammatory agent. In the current study, we attempted to investigate its renoprotective activity and underlying mechanisms in a rat model of membranous glomerulonephritis induced by cationic bovine serum albumin (c-BSA). Sprague-Dawley (SD) rats were divided into five groups, including normal control, model control, Mycophenolate Mofetil-treated group, and two skimming-treated groups (15 mg/kg and 30 mg/kg). Our research showed that treatment with skimmin significantly reduced the levels of blood urea nitrogen (BUN), urinary albumin excretion (UAE), and serum creatinine (Scr) as compared with model control after experimental induction of membranous glomerulonephritis ( P 〈 0.01 ). Moreover, glomerular hypercellularity, tubulointerstitial injury, and glomerular deposition of IgG were less intense after skimmin treatment. By immunochemistry analysis, we demonstrated that skimmin could significantly inhibit interleukin-1 β (IL1 β ) and IL-6 expression ( P 〈 0.05 ), reduce the loss of nephrin and podocin, and suppress the infiltration of renal interstitium by CD3-positive T cell and CD20-positive B cell. These results suggest that treatment with skimmin can significantly improve renal function and suppress the IgG deposition as well as the development of glomerular lesions in a rat model of membranous glomerulonephritis.
    Type of Medium: Online Resource
    ISSN: 1741-427X , 1741-4288
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2013
    detail.hit.zdb_id: 2148302-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Hindawi Limited ; 2014
    In:  Evidence-Based Complementary and Alternative Medicine Vol. 2014 ( 2014), p. 1-8
    In: Evidence-Based Complementary and Alternative Medicine, Hindawi Limited, Vol. 2014 ( 2014), p. 1-8
    Abstract: Neurostimulation procedures like vagus nerve stimulation (VNS) and deep brain stimulation have been used to treat refractory epilepsy and other neurological disorders. While holding promise, they are invasive interventions with serious complications and adverse effects. Moreover, their efficacies are modest with less seizure free. Acupuncture is a simple, safe, and effective traditional healing modality for a wide range of diseases including pain and epilepsy. Thalamus takes critical role in sensory transmission and is highly involved in epilepsy genesis particularly the absence epilepsy. Considering thalamus serves as a convergent structure for both acupuncture and VNS and the thalamic neuronal activities can be modulated by acupuncture, we propose that acupuncture could be a promising therapy or at least a screening tool to select suitable candidates for those invasive modalities in the management of refractory epilepsy.
    Type of Medium: Online Resource
    ISSN: 1741-427X , 1741-4288
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2014
    detail.hit.zdb_id: 2148302-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Security and Communication Networks Vol. 2018 ( 2018-08-02), p. 1-14
    In: Security and Communication Networks, Hindawi Limited, Vol. 2018 ( 2018-08-02), p. 1-14
    Abstract: Network security metrics allow quantitatively evaluating the overall resilience of networked systems against attacks. From this aim, security metrics are of great importance to the security-related decision-making process of enterprises. In this paper, we employ absorbing Markov chain (AMC) to estimate the network security combining with the technique of big data correlation analysis. Specifically, we construct the model of AMC using a large amount of alert data to describe the scenario of multistep attacks in the real world. In addition, we implement big data correlation analysis to generate the transition probability matrix from alert stream, which defines the probabilities of transferring from one attack action to another according to a given scenario before reaching one of some attack targets. Based on the probability reasoning, two metric algorithms are designed to estimate the attack scenario as well as the attackers, namely, the expected number of visits (ENV) and the expected success probability (ESP). The superiority is that the proposed model and algorithms assist the administrator in building new scenarios, prioritizing alerts, and ranking them.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2415104-X
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    In: The Scientific World Journal, Hindawi Limited, Vol. 2014 ( 2014), p. 1-6
    Abstract: Low-molecular-weight glutenin subunits (LMW-GS) are of great importance in processing quality and participate in the formation of polymers in wheat. In this study, eight new LMW-GS alleles were isolated from Chinese wheat landraces ( Triticum aestivum L.) and designated as Glu-A3-1a , Glu-A3-1b , Glu-B3-1a , Glu-B3-1b , Glu-B3-1c , Glu-D3-1a , Glu-D3-1b , and Glu-D3-1c , which were located at the Glu-A3 , Glu-B3 , and Glu-D3 loci, respectively. Based on the proteins encoded, the number of deduced amino acids of Glu-B3 alleles was approximately 50 more than those of Glu-A3 and Glu-D3 alleles. The first cysteine of Glu-A3 and Glu-D3 alleles was located at the N-terminal domain, while that of Glu-B3 alleles was found in the repetitive domain, which may lead to the different functioning in forming disulfide bonds. All the eight genes were LMW-m types and the new allele of Glu-B3-1a which had nine cysteine residues may be the desirable LMW-GS gene for improving bread-making quality.
    Type of Medium: Online Resource
    ISSN: 2356-6140 , 1537-744X
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2014
    detail.hit.zdb_id: 2075968-X
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Hindawi Limited ; 2016
    In:  Mathematical Problems in Engineering Vol. 2016 ( 2016), p. 1-10
    In: Mathematical Problems in Engineering, Hindawi Limited, Vol. 2016 ( 2016), p. 1-10
    Abstract: Combined with two different types of image dehazing strategies based on image enhancement and atmospheric physical model, respectively, a novel method for gray-scale image dehazing is proposed in this paper. For image-enhancement-based strategy, the characteristics of its simplicity, effectiveness, and no color distortion are preserved, and the common guided image filter is modified to match the application of image enhancement. Through wavelet decomposition, the high frequency boundary of original image is preserved in advance. Moreover, the process of image dehazing can be guided by the image of scene depth proportion directly estimated from the original gray-scale image. Our method has the advantages of brightness consistency and no distortion over the state-of-the-art methods based on atmospheric physical model. Particularly, our method overcomes the essential shortcoming of the abovementioned methods that are mainly working for color image. Meanwhile, an image of scene depth proportion is acquired as a byproduct of image dehazing.
    Type of Medium: Online Resource
    ISSN: 1024-123X , 1563-5147
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2016
    detail.hit.zdb_id: 2014442-8
    SSG: 11
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    In: Mediators of Inflammation, Hindawi Limited, Vol. 2021 ( 2021-5-25), p. 1-11
    Abstract: Objective. Adolescent idiopathic scoliosis (AIS) is a relatively common spinal rotation deformity, and the pathogenesis of AIS is accompanied by metabolic dysfunction and changes in biochemical factors. In this study, plasma metabolite changes in AIS patients were analyzed based on nontargeted metabolomics to provide new insights for clarifying functional metabolic abnormalities in AIS patients. Methods. Clinical indexes and blood samples were collected from 12 healthy subjects and 16 AIS patients. Metabolomics was used to analyze the changes in metabolites in plasma samples. The correlation between plasma metabolites and clinical indexes was analyzed by the Spearman rank correlation coefficient. Results. Analysis of clinical data showed that the body weight, body mass index (BMI), and bone mineral density (BMD) index of the AIS group significantly decreased, while the blood phosphorus and Cobb angles increased significantly. Metabolomic analysis showed significant changes in 72 differential metabolites in the plasma of the AIS group, mainly including organooxygen compounds, carboxylic acids and derivatives, fatty acyls, steroids and steroid derivatives, and keto acids and derivatives. The Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway showed that arginine biosynthesis, D-glutamine and D-glutamate metabolism, alanine, aspartate and glutamate metabolism, and citrate cycle (TCA cycle) were significantly enriched in the AIS and healthy groups. Spearman rank correlation coefficient analysis showed that the plasma metabolites C00026 (oxoglutarate), C00062 (L-arginine, arginine), C01042 (N-acetylaspartate), and C00158 (citrate) were significantly correlated with clinical indexes in AIS patients. In the healthy group, the plasma metabolites C00122 (fumarate), C00025 (glutamate and L-glutamic acid) and C00149 (malate, L-malic acid) were significantly correlated with clinical indexes, while C00624 (N-acetylglutamate) was not significantly correlated with the clinical indexes. Conclusion. The occurrence of AIS led to changes in clinical indexes and plasma metabolites. Plasma biomarkers and functional metabolic pathways were correlated with clinical indexes, which might provide new insights for the diagnosis and treatment of AIS.
    Type of Medium: Online Resource
    ISSN: 1466-1861 , 0962-9351
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2008065-7
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Wireless Communications and Mobile Computing Vol. 2022 ( 2022-2-22), p. 1-11
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-2-22), p. 1-11
    Abstract: The cloud computing industry is booming, which involves a large amount of data transmission and calculation, and polynomial calculation is the most basic calculation. Since polynomial calculations have extremely high requirements on the computing power of computing equipment, in most cases, the computing equipment in the user’s hands cannot meet the computing requirements. The user needs to calculate but has no way to do it by himself. In this case, the computing task must be handed over to the cloud server. Aiming at the untrustworthy problem of the cloud server environment, an improved verifiable polynomial cloud outsourcing computing protocol scheme based on the previous outsourcing computing protocol is proposed to ensure the security of the computing process, the privacy of the computing content, and the verifiability of the computing results. This solution hides all the calculation parameters behind the deformed encrypted parameters, so the cloud server cannot obtain the user’s true parameters during the calculation process, and the calculation results can be verified by the user on the client with minimal computing power.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Hindawi Limited ; 2021
    In:  Security and Communication Networks Vol. 2021 ( 2021-8-10), p. 1-17
    In: Security and Communication Networks, Hindawi Limited, Vol. 2021 ( 2021-8-10), p. 1-17
    Abstract: Scanning attack is normally the first step of many other network attacks such as DDoS and propagation worm. Because of easy implementation and high returns, scanning attack especially cooperative scanning attack is widely used by hackers, which has become a serious threat to network security. In order to defend against scanning attack, this paper proposes an adaptive IP hopping in software defined network for moving target defense (MTD). In order to accurately respond to attacker’s behavior in real time, a light-weight convolutional neural network (CNN) detector composed of three convolutional modules and a judgment module is proposed to sense scanning attack. Input data of the detector is generated via designed packets sampling and data preprocess. The detection result of the detector is used to trigger IP hopping. In order to provide some fault tolerance for the CNN detector, IP hopping can also be triggered by a preset timer. The CNN driving adaptability is applied to a three-level hopping strategy to make the MTD system optimize its behavior according to real time attack. Experiments show that compared with existing technologies, our proposed method can significantly improve the defense effect to mitigate scanning attack and its subsequent attacks which are based on hit list. Hopping frequency of the proposed method is also lower than that of other methods, so the proposed method shows lower system overhead.
    Type of Medium: Online Resource
    ISSN: 1939-0122 , 1939-0114
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2415104-X
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages