首页 > 最新文献

信息工程最新文献

英文 中文
IF:
Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia 印度尼西亚 COVID-19 合并症和三剂疫苗接种的建模和优化控制
Q1 Social Sciences Pub Date : 2024-07-06 DOI: 10.1016/j.jobb.2024.06.004
Muhammad Abdurrahman Rois , Fatmawati , Cicik Alfiniyah , Santi Martini , Dipo Aldila , Farai Nyabadza

This paper presents and examines a COVID-19 model that takes comorbidities and up to three vaccine doses into account. We analyze the stability of the equilibria, examine herd immunity, and conduct a sensitivity analysis validated by data on COVID-19 in Indonesia. The disease-free equilibrium is locally and globally asymptotically stable whenever the basic reproduction number is less than one, while an endemic equilibrium exists and is globally asymptotically stable when the number is greater than one. Subsequently, the model incorporates two effective measures, namely public education and enhanced medical care, to determine the most advantageous approach for mitigating the transmission of the disease. The optimal control model is then determined using Pontryagin’s maximum principle. The integrated control strategy is the best method for reliably safeguarding the general population against COVID-19 infection. Cost evaluations and numerical simulations corroborate this conclusion.

本文介绍并研究了将合并症和多达三种疫苗剂量考虑在内的 COVID-19 模型。我们分析了均衡的稳定性,研究了群体免疫,并通过印度尼西亚 COVID-19 的数据进行了敏感性分析。当基本繁殖数小于 1 时,无病平衡是局部和全局渐近稳定的,而当基本繁殖数大于 1 时,存在地方病平衡,并且是全局渐近稳定的。随后,该模型纳入了两种有效措施,即公共教育和加强医疗保健,以确定缓解疾病传播的最有利方法。然后,利用庞特里亚金最大原则确定最佳控制模型。综合控制策略是可靠保护大众免受 COVID-19 感染的最佳方法。成本评估和数值模拟证实了这一结论。
{"title":"Modeling and optimal control of COVID-19 with comorbidity and three-dose vaccination in Indonesia","authors":"Muhammad Abdurrahman Rois ,&nbsp;Fatmawati ,&nbsp;Cicik Alfiniyah ,&nbsp;Santi Martini ,&nbsp;Dipo Aldila ,&nbsp;Farai Nyabadza","doi":"10.1016/j.jobb.2024.06.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.004","url":null,"abstract":"<div><p>This paper presents and examines a COVID-19 model that takes comorbidities and up to three vaccine doses into account. We analyze the stability of the equilibria, examine herd immunity, and conduct a sensitivity analysis validated by data on COVID-19 in Indonesia. The disease-free equilibrium is locally and globally asymptotically stable whenever the basic reproduction number is less than one, while an endemic equilibrium exists and is globally asymptotically stable when the number is greater than one. Subsequently, the model incorporates two effective measures, namely public education and enhanced medical care, to determine the most advantageous approach for mitigating the transmission of the disease. The optimal control model is then determined using Pontryagin’s maximum principle. The integrated control strategy is the best method for reliably safeguarding the general population against COVID-19 infection. Cost evaluations and numerical simulations corroborate this conclusion.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000347/pdfft?md5=e3f237c1b54058dbee82e284d716e498&pid=1-s2.0-S2588933824000347-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141606860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations 不仅要有良好的态度:对安全建议态度的因素探讨
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-07-03 DOI: 10.1093/cybsec/tyae011
Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla
Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.
工作场所中与信息安全有关的行动(IS-行动)由许多因素决定。对遵守安全规则和建议的态度以及对具体 IS 行动的态度决定了与这些行动相关的意向。对 IS 的研究探讨了态度的工具性作用。然而,有学者认为,对行为对象的态度是一个多维度的结构。我们研究了对安全建议的态度的维度,假设其具有多维性,并开发了一个新的量表[对安全建议的态度(ASR 量表)]。结果表明,对安全建议的态度具有多维性,支持了我们的假设。结果显示了两个维度,分别对应于对安全建议合法性和有效性的感知以及对其严谨性的感知。新的 ASR 量表显示出良好的心理测量特性。这项研究表明,在 IS 环境中,态度是一个多维度的结构,这对 IS 研究做出了贡献。这些发现意味着,员工对信息安全政策的评价可以考虑其工具性(安全建议很重要)和严格性(安全建议很严格)。态度维度对 IS 行动的不同影响建议采取不同的干预措施。此外,本研究还提供了 ASR 量表,作为了解员工对安全建议评价的新工具。
{"title":"It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations","authors":"Miguel A Toro-Jarrin, Pilar Pazos, Miguel A Padilla","doi":"10.1093/cybsec/tyae011","DOIUrl":"https://doi.org/10.1093/cybsec/tyae011","url":null,"abstract":"Numerous factors determine information security-related actions (IS-actions) in the workplace. Attitudes toward following security rules and recommendations and attitudes toward specific IS actions determine intentions associated with those actions. IS research has examined the role of the instrumental aspect of attitudes. However, authors argue that attitudes toward a behavioral object are a multidimensional construct. We examined the dimensionality of attitudes toward security recommendations, hypothesized its multidimensional nature, and developed a new scale [attitudes toward security recommendations (ASR scale)]. The results indicated the multidimensional nature of attitudes toward security recommendations supporting our hypothesis. The results revealed two dimensions corresponding to the perceived legitimacy and effectiveness of security recommendations and its perceived rigor. The new ASR scale showed good psychometric properties. This work contributes to the IS research at suggesting that attitudes are a multidimensional construct in the IS context. These findings imply that the employee’s evaluation of information security policy can be examined considering their instrumentality (security recommendations are important) and rigor (security recommendations are strict). Different effects of the dimensions of attitudes over IS-action suggest different interventions. Additionally, this study offers the ASR scale as a new instrument to capture employees’ evaluation of security recommendations.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures 应对中东痘病毒挑战,加强生物安全和生物安保措施
Q1 Social Sciences Pub Date : 2024-07-02 DOI: 10.1016/j.jobb.2024.06.003
Laith N. AL-Eitan , Haneen O. Ali , Hana S. Abu Kharmah , Maryam K. Alasmar , Iliya Y. Khair , Ahmad H. Mihyar

The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.

痘病毒在中东地区的出现和人畜共患传播已被视为复杂的公共卫生问题。痘病毒是一个庞大的 DNA 病毒家族,可感染多种宿主,包括动物和人类。中东地区曾多次发生痘病毒感染(如猴痘、天花和骆驼痘)疫情,对牲畜、野生动物和零星人类病例造成的危害引起了人们的关注。本综述旨在深入研究流行病学模式的复杂性、错综复杂的遗传多样性以及支持痘病毒在中东地区出现和人畜共患传播的若干诱因。痘病毒的几个方面促成了地方流行病的出现和人畜共患病的爆发,例如人与动物之间复杂的相互作用、环境变化及其微妙的病毒适应能力。编写这篇综述的目的是希望加深人们对痘病毒生物学及其对中东地区人类和动物健康影响的了解。我们全面概述了中东地区最常见的痘病毒,包括它们的分类、结构、复制周期、致病机理、传播途径,以及中东地区如何开发出缓解这些生物威胁的方法。
{"title":"Addressing poxvirus challenges in the Middle East to enhance biosafety and biosecurity measures","authors":"Laith N. AL-Eitan ,&nbsp;Haneen O. Ali ,&nbsp;Hana S. Abu Kharmah ,&nbsp;Maryam K. Alasmar ,&nbsp;Iliya Y. Khair ,&nbsp;Ahmad H. Mihyar","doi":"10.1016/j.jobb.2024.06.003","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.003","url":null,"abstract":"<div><p>The emergence and zoonotic transmission of poxviruses in the Middle East have been recognized as complex public health issues. Poxviruses, a vast family of DNA viruses, can infect many hosts, including animals and humans. The Middle East has had multiple epidemics of poxvirus infections (e.g., Monkeypox, Smallpox, and Camelpox) that have raised concerns owing to their detrimental effects on livestock, wildlife, and sporadic human cases. This review aims to thoroughly examine the complexity of the epidemiological patterns, intricate genetic diversity, and several contributing factors that support the emergence and zoonotic transmission of poxviruses in the Middle East. Several aspects of poxviruses contribute to the emergence of endemics and zoonotic breakouts, such as the complex nature of human-animal interactions, environmental changes, and their subtle capacity for viral adaptability. This review was compiled in the hopes of contributing to the current understanding of poxvirus biology and its implications for human and animal health in the Middle East. We provide a comprehensive overview of the most common poxviruses in the Middle East, including their classification, structure, replication cycle, pathogenesis, route of transmissions, and of how the Middle East has developed ways to mitigate these biological threats.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000335/pdfft?md5=951f14f2c0d40a84ed4f933830b032c0&pid=1-s2.0-S2588933824000335-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program 探索疟疾控制计划中社会意识与蚊帐使用之间的相互作用
Q1 Social Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jobb.2024.06.005
Iffatricia Haura Febiriana, D. Aldila, B. Handari, Puji Budi Setia Asih, Muhamad Hifzhudin Noor Aziz
{"title":"Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program","authors":"Iffatricia Haura Febiriana, D. Aldila, B. Handari, Puji Budi Setia Asih, Muhamad Hifzhudin Noor Aziz","doi":"10.1016/j.jobb.2024.06.005","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.005","url":null,"abstract":"","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment 斯塔克尔伯格式相互依存的安全博弈:先行者优势如何影响搭便车和安全(投资不足)问题
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-06-28 DOI: 10.1093/cybsec/tyae009
Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu
Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.
网络博弈通常用于捕捉相互关联的代理人在同时行动中的战略互动。在纳什均衡中,代理人的行动必须考虑到他们之间的相互依赖关系,这通常是通过求解一组固定点方程获得的。另一方面,斯塔克尔伯格博弈模拟的是被划分为领导者和追随者的代理人之间的顺序行动。相应的解概念,即子博弈完全均衡,通常是通过逆向归纳法得到的。这两种博弈形式在(网络)安全文献中都有非常广泛的应用,网络博弈通常是研究安全投资和外部性的模板,也被称为相互依存的安全博弈,而斯塔克尔伯格博弈则是模拟各种攻击者-防御者情景的形式主义。在本研究中,我们研究了一种结合了这两种战略推理的模型:相互依赖和顺序移动。具体来说,我们考虑的情景是由相互连接的先行者(企业或防御者,其安全努力和实践共同决定了生态系统的安全态势)和一个或多个后行者(攻击者)组成的网络,后者决定在攻击众多潜在目标时需要付出多少努力。这就产生了一个平衡概念,它体现了上述两类平衡。我们将研究它的存在性和唯一性条件与标准网络博弈的存在性和唯一性条件有何不同。尤其值得关注的是,这两种博弈形式分别在防御方和攻击方所付出的努力以及防御方的搭便车行为方面的比较。
{"title":"Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment","authors":"Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu","doi":"10.1093/cybsec/tyae009","DOIUrl":"https://doi.org/10.1093/cybsec/tyae009","url":null,"abstract":"Network games are commonly used to capture the strategic interactions among interconnected agents in simultaneous moves. The agents’ actions in a Nash equilibrium must take into account the mutual dependencies connecting them, which is typically obtained by solving a set of fixed point equations. Stackelberg games, on the other hand, model the sequential moves between agents that are categorized as leaders and followers. The corresponding solution concept, the subgame perfect equilibrium, is typically obtained using backward induction. Both game forms enjoy very wide use in the (cyber)security literature, the network game often as a template to study security investment and externality—also referred to as the interdependent security games—and the Stackelberg game as a formalism to model a variety of attacker–defender scenarios. In this study, we examine a model that combines both types of strategic reasoning: the interdependency as well as sequential moves. Specifically, we consider a scenario with a network of interconnected first movers (firms or defenders, whose security efforts and practices collectively determine the security posture of the eco-system) and one or more second movers, the attacker(s), who determine how much effort to exert on attacking the many potential targets. This gives rise to an equilibrium concept that embodies both types of equilibria mentioned above. We will examine how its existence and uniqueness conditions differ from that for a standard network game. Of particular interest are comparisons between the two game forms in terms of effort exerted by the defender(s) and the attacker(s), respectively, and the free-riding behavior among the defenders.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates 考虑到非线性发病率和恢复率的免疫力减弱类疾病爆发数学模型
Q1 Social Sciences Pub Date : 2024-06-26 DOI: 10.1016/j.jobb.2024.05.005
Nursanti Anggriani , Lazarus Kalvein Beay , Meksianis Z. Ndii , Fatuh Inayaturohmat , Sanubari Tansah Tresna

In the spread of infectious diseases, intervention levels play a crucial role in shaping interactions between healthy and infected individuals, leading to a nonlinear transmission process. Additionally, the availability of medical resources limits the recovery rate of infected patients, adding further nonlinear dynamics to the healing process. Our research introduces novelty by combining nonlinear incidence and recovery rates alongside waning immunity in an epidemic model. We present a modified SIRW-type model, examining the epidemic problem with these factors. Through analysis, we explore conditions for non-endemic and co-existing cases based on the basic reproduction ratio. The local stability of equilibria is verified using the Routh-Hurwitz criteria, while global stability is assessed using Lyapunov functions for each equilibrium. Furthermore, we investigate bifurcations around both non-endemic and co-existing equilibria. Numerically, we give some simulations to support our analytical findings.

在传染病的传播过程中,干预水平对健康人和受感染者之间的互动起着至关重要的作用,从而导致非线性传播过程。此外,医疗资源的可用性也限制了感染者的康复率,进一步增加了治疗过程的非线性动态性。我们的研究将非线性发病率和康复率与免疫力减弱结合在一个流行病模型中,从而带来了新颖性。我们提出了一个改进的 SIRW 型模型,研究了包含这些因素的流行病问题。通过分析,我们探讨了基于基本繁殖率的非流行病例和共存病例的条件。我们使用 Routh-Hurwitz 准则验证了均衡的局部稳定性,同时使用每个均衡的 Lyapunov 函数评估了全局稳定性。此外,我们还研究了非地方性均衡和共存均衡周围的分岔。在数值上,我们给出了一些模拟来支持我们的分析结果。
{"title":"A mathematical model for a disease outbreak considering waning-immunity class with nonlinear incidence and recovery rates","authors":"Nursanti Anggriani ,&nbsp;Lazarus Kalvein Beay ,&nbsp;Meksianis Z. Ndii ,&nbsp;Fatuh Inayaturohmat ,&nbsp;Sanubari Tansah Tresna","doi":"10.1016/j.jobb.2024.05.005","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.005","url":null,"abstract":"<div><p>In the spread of infectious diseases, intervention levels play a crucial role in shaping interactions between healthy and infected individuals, leading to a nonlinear transmission process. Additionally, the availability of medical resources limits the recovery rate of infected patients, adding further nonlinear dynamics to the healing process. Our research introduces novelty by combining nonlinear incidence and recovery rates alongside waning immunity in an epidemic model. We present a modified SIRW-type model, examining the epidemic problem with these factors. Through analysis, we explore conditions for non-endemic and co-existing cases based on the basic reproduction ratio. The local stability of equilibria is verified using the Routh-Hurwitz criteria, while global stability is assessed using Lyapunov functions for each equilibrium. Furthermore, we investigate bifurcations around both non-endemic and co-existing equilibria. Numerically, we give some simulations to support our analytical findings.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000311/pdfft?md5=9a3f3ac37c5d275226798d8df28d62fc&pid=1-s2.0-S2588933824000311-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The association between mycotic pneumonia and neonatal septicemia 霉菌性肺炎与新生儿败血症之间的关系
Q1 Social Sciences Pub Date : 2024-06-26 DOI: 10.1016/j.jobb.2024.06.002
Salman Khalid Salman, Yasir Mufeed Abdulateef, Sawsan Qahtan Taha Al-Quhli

Background

Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.

Objectives

From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.

Methods

All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.

Results

The average white blood count for the neonates was 8547 ± 5884.5 cells/mm2. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as Candida albicans, 6 (10 %) as Candida tropicalis, and 5 (8.3 %) as Cryptococcus laurentii. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.

Conclusion

We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.

背景念珠菌是新生儿重症监护室(NICU)晚期感染的第四大常见病原,是导致大量发病和死亡的原因。方法本研究中的所有婴儿均被诊断为败血症,并接受了经验性抗菌治疗。结果新生儿的平均白细胞计数为 8547 ± 5884.5 cells/mm2。C 反应蛋白平均值为 39.3 ± 26 mg/l,血清白蛋白平均值为 2.9 ± 0.2 g/dl,细菌血培养阳性 28 例(46.7%)。研究期间有 9 名(15%)新生儿死亡。所有样本的 NG 管培养均发现有真菌生长。其中 49 例(81.6%)被鉴定为白色念珠菌,6 例(10%)为热带念珠菌,5 例(8.3%)为月桂隐球菌。NG 管样本的细菌培养结果显示,13 例(21.6%)患者感染了革兰氏阳性菌,47 例(78.3%)患者感染了革兰氏阴性菌。霉菌感染是新生儿败血症呼吸衰竭的可能原因之一,需要引起全球关注。
{"title":"The association between mycotic pneumonia and neonatal septicemia","authors":"Salman Khalid Salman,&nbsp;Yasir Mufeed Abdulateef,&nbsp;Sawsan Qahtan Taha Al-Quhli","doi":"10.1016/j.jobb.2024.06.002","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.06.002","url":null,"abstract":"<div><h3>Background</h3><p>Candida species are the fourth most common etiological agents of late-onset infection in the neonatal intensive care unit (NICU) and are responsible for considerable morbidity and mortality.</p></div><div><h3>Objectives</h3><p>From November 2023 to February 2024, we investigated the association of mycotic pneumonia with septicemia in 60 neonates, and their roles of mycotic pneumonia in the morbidity and mortality of neonates in two NICUs in the Al-Ramadi Teaching Hospital for Maternity and Children.</p></div><div><h3>Methods</h3><p>All infants in this study had been diagnosed with septicemia and treated with empirical antimicrobial therapy. An early morning nasogastric tube (NG-tube) was used to collect swallowed sputum by suction for culture and sensitivity testing.</p></div><div><h3>Results</h3><p>The average white blood count for the neonates was 8547 ± 5884.5 cells/mm<sup>2</sup>. The mean C-reactive protein was 39.3 ± 26 mg/l, the mean serum albumin was 2.9 ± 0.2 g/dl and the positive bacterial blood culture was 28 (46.7 %). 9 (15 %) neonates died during the study period. The NG-tube culture identified fungal growth in all samples. Of these, 49 (81.6 %) were identified as <em>Candida albicans</em>, 6 (10 %) as <em>Candida tropicalis</em>, and 5 (8.3 %) as <em>Cryptococcus laurentii</em>. The bacterial culture results from the NG-tube samples identified 13 (21.6 %) patients with gram-positive bacteria and 47 (78.3 %) with gram-negative bacteria.</p></div><div><h3>Conclusion</h3><p>We found a prevalence of Candida spp. among neonates in addition to microbial oxygen tube contamination, indicating a biosafety breach in the neonatal unit. Mycotic infection requires global attention as a probable cause of respiratory failure in neonatal septicemia.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000323/pdfft?md5=e98223a68d44a37acdaeed7c16c9e563&pid=1-s2.0-S2588933824000323-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein 基于结构发现 F. religiosa 植物化学物质作为猴痘 (mpox) 病毒蛋白的潜在抑制剂
Q1 Social Sciences Pub Date : 2024-06-24 DOI: 10.1016/j.jobb.2024.05.004
Ranjan K. Mohapatra , Ahmed Mahal , Pranab K. Mohapatra , Ashish K. Sarangi , Snehasish Mishra , Meshari A. Alsuwat , Nada N. Alshehri , Sozan M. Abdelkhalig , Mohammed Garout , Mohammed Aljeldah , Ahmad A. Alshehri , Ahmed Saif , Mohammed Abdulrahman Alshahrani , Ali S. Alqahtani , Yahya A. Almutawif , Hamza M.A. Eid , Faisal M Albaqami , Mohnad Abdalla , Ali A. Rabaan

Outbreaks of Monkeypox (mpox) in over 100 non-endemic countries in 2022 represented a serious global health concern. Once a neglected disease, mpox has become a global public health issue. A42R profilin-like protein from mpox (PDB ID: 4QWO) represents a potential new lead for drug development and may interact with various synthetic and natural compounds. In this report, the interaction of A42R profilin-like protein with six phytochemicals found in the medicinal plant Ficus religiosa (abundant in India) was examined. Based on the predicted and compared protein–ligand binding energies, biological properties, IC50 values and toxicity, two compounds, kaempferol (C-1) and piperine (C-4), were selected. ADMET characteristics and quantitative structure–activity relationship (QSAR) of these two compounds were determined, and molecular dynamics (MD) simulations were performed. In silico examination of the kaempferol (C-1) and piperine (C-4) interactions with A42R profilin-like protein gave best-pose ligand-binding energies of –6.98 and –5.57 kcal/mol, respectively. The predicted IC50 of C-1 was 7.63 μM and 82 μM for C-4. Toxicity data indicated that kaempferol and piperine are non-mutagenic, and the QSAR data revealed that piperlongumine (5.92) and piperine (5.25) had higher log P values than the other compounds examined. MD simulations of A42R profilin-like protein in complex with C-1 and C-4 were performed to examine the stability of the ligand–protein interactions. As/C and C-4 showed the highest affinity and activities, they may be suitable lead candidates for developing mpox therapeutic drugs. This study should facilitate discovering and synthesizing innovative therapeutics to address other infectious diseases.

2022 年,猴痘在 100 多个非流行国家爆发,成为全球严重的健康问题。猴痘曾经是一种被忽视的疾病,如今已成为一个全球性的公共卫生问题。痘苗中的 A42R 侧蛋白样蛋白(PDB ID:4QWO)是药物开发的潜在新线索,可能与多种合成化合物和天然化合物相互作用。在本报告中,研究人员考察了 A42R 蛋白与药用植物 Ficus religiosa(印度盛产)中的六种植物化学物质之间的相互作用。根据预测和比较的蛋白配体结合能、生物特性、IC50 值和毒性,选出了两种化合物,即山奈酚(C-1)和胡椒碱(C-4)。确定了这两种化合物的 ADMET 特性和定量结构-活性关系(QSAR),并进行了分子动力学(MD)模拟。通过对山奈酚(C-1)和胡椒碱(C-4)与 A42R 类扁平苔藓蛋白的相互作用进行硅学研究,得出的最佳配体结合能分别为 -6.98 和 -5.57 kcal/mol。预测 C-1 的 IC50 为 7.63 μM,C-4 为 82 μM。毒性数据表明,山奈酚和胡椒碱不具有致突变性,QSAR 数据显示,胡椒龙葵碱(5.92)和胡椒碱(5.25)的对数 P 值高于所研究的其他化合物。为了研究配体与蛋白质之间相互作用的稳定性,我们对 A42R 类扁平苔藓蛋白与 C-1 和 C-4 的复合物进行了 MD 模拟。As/C和C-4显示出最高的亲和力和活性,它们可能是开发mpox治疗药物的合适候选先导化合物。这项研究将有助于发现和合成治疗其他传染病的创新药物。
{"title":"Structure-based discovery of F. religiosa phytochemicals as potential inhibitors against Monkeypox (mpox) viral protein","authors":"Ranjan K. Mohapatra ,&nbsp;Ahmed Mahal ,&nbsp;Pranab K. Mohapatra ,&nbsp;Ashish K. Sarangi ,&nbsp;Snehasish Mishra ,&nbsp;Meshari A. Alsuwat ,&nbsp;Nada N. Alshehri ,&nbsp;Sozan M. Abdelkhalig ,&nbsp;Mohammed Garout ,&nbsp;Mohammed Aljeldah ,&nbsp;Ahmad A. Alshehri ,&nbsp;Ahmed Saif ,&nbsp;Mohammed Abdulrahman Alshahrani ,&nbsp;Ali S. Alqahtani ,&nbsp;Yahya A. Almutawif ,&nbsp;Hamza M.A. Eid ,&nbsp;Faisal M Albaqami ,&nbsp;Mohnad Abdalla ,&nbsp;Ali A. Rabaan","doi":"10.1016/j.jobb.2024.05.004","DOIUrl":"https://doi.org/10.1016/j.jobb.2024.05.004","url":null,"abstract":"<div><p>Outbreaks of Monkeypox (mpox) in over 100 non-endemic countries in 2022 represented a serious global health concern. Once a neglected disease, mpox has become a global public health issue. A42R profilin-like protein from mpox (PDB ID: 4QWO) represents a potential new lead for drug development and may interact with various synthetic and natural compounds. In this report, the interaction of A42R profilin-like protein with six phytochemicals found in the medicinal plant <em>Ficus religiosa</em> (abundant in India) was examined. Based on the predicted and compared protein–ligand binding energies, biological properties, IC<sub>50</sub> values and toxicity, two compounds, kaempferol (C-1) and piperine (C-4), were selected. ADMET characteristics and quantitative structure–activity relationship (QSAR) of these two compounds were determined, and molecular dynamics (MD) simulations were performed. <em>In silico</em> examination of the kaempferol (C-1) and piperine (C-4) interactions with A42R profilin-like protein gave best-pose ligand-binding energies of –6.98 and –5.57 kcal/mol, respectively. The predicted IC<sub>50</sub> of C-1 was 7.63 μM and 82 μM for C-4. Toxicity data indicated that kaempferol and piperine are non-mutagenic, and the QSAR data revealed that piperlongumine (5.92) and piperine (5.25) had higher log P values than the other compounds examined. MD simulations of A42R profilin-like protein in complex with C-1 and C-4 were performed to examine the stability of the ligand–protein interactions. As/C and C-4 showed the highest affinity and activities, they may be suitable lead candidates for developing mpox therapeutic drugs. This study should facilitate discovering and synthesizing innovative therapeutics to address other infectious diseases.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S258893382400030X/pdfft?md5=ec15123379db8c297e57ae0d9b373a79&pid=1-s2.0-S258893382400030X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university 琐碎的门票建立信任":了解一所大型大学中安全支持互动的共同设计方法
IF 3.9 Q1 SOCIAL SCIENCES, INTERDISCIPLINARY Pub Date : 2024-06-20 DOI: 10.1093/cybsec/tyae007
Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin
Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.
越来越多的组织认识到人的因素在工作场所安全管理中的重要性。在管理安全基础设施方面存在着挑战,其中可能有中央授权和地方管理的措施来促进安全行为。我们在一所大型大学中采用了共同设计方法来协调员工行为和集中式安全管理。这包括通过共同设计方法进行的一轮又一轮的访谈,访谈对象包括:14 名处理高价值数据并有特殊安全需求的员工;7 名跨本地和中央 IT 及 IT 安全支持团队的支持人员;以及两名组织中的高级安全决策者。我们发现,员工更喜欢本地支持,以及确保他们行为安全的保证,而不是缺乏本地背景的精确指示。对了解本地需求的支持团队的信任也会提高员工的参与度,尤其是那些不知道该怎么做的员工。员工通过与支持人员的互动,以及看到同事在工作场所实施安全行为,就能理解政策。迭代式共同设计方法汇集了一系列员工群体和安全决策者的观点,抓住了推动安全工作实践的关键影响因素。我们提出了改进工作场所安全的建议,包括认识到政策沟通与政策内容同等重要。
{"title":"‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university","authors":"Albesë Demjaha, David Pym, Tristan Caulfield, Simon Parkin","doi":"10.1093/cybsec/tyae007","DOIUrl":"https://doi.org/10.1093/cybsec/tyae007","url":null,"abstract":"Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141502762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review 基于机器学习技术的电子商务欺诈检测:系统性文献综述
IF 13.6 1区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.26599/bdma.2023.9020023
Abed Mutemi, F. Bação
: The e-commerce industry’s rapid growth, accelerated by the COVID-19 pandemic, has led to an alarming increase in digital fraud and associated losses. To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. While ML and data mining techniques are popular in fraud detection, specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth. Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context. To bridge this gap, our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) methodology. We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape. Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs. Through our investigation, we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud. Our paper examines the research on these techniques as published in the past decade. Employing the PRISMA approach, we conducted a content analysis of 101 publications, identifying research gaps, recent techniques, and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.
:随着 COVID-19 的流行,电子商务行业迅速发展,导致数字欺诈和相关损失惊人增加。要建立一个健康的电子商务生态系统,强有力的网络安全和反欺诈措施至关重要。然而,由于现实世界的数据集有限,有关欺诈检测系统的研究一直难以跟上步伐。人工智能、机器学习(ML)和云计算的进步振兴了这一领域的研究和应用。虽然 ML 和数据挖掘技术在欺诈检测中很受欢迎,但针对其在 eBay 和 Facebook 等电子商务平台中应用的具体评论却缺乏深度。现有的评论提供了广泛的概述,但未能把握电子商务背景下 ML 算法的复杂性。为了弥补这一不足,我们的研究采用系统性综述和元分析首选报告项目(PRISMA)方法进行了系统性文献综述。我们的目标是探索这些技术在数字市场和更广泛的电子商务领域中欺诈检测的有效性。鉴于欺诈事件和相关成本不断上升,了解文献现状和新兴趋势至关重要。通过调查,我们发现了研究机会,并就打击电子商务欺诈的关键 ML 和数据挖掘技术为行业利益相关者提供了见解。我们的论文研究了过去十年间发表的有关这些技术的研究成果。采用 PRISMA 方法,我们对 101 篇出版物进行了内容分析,找出了研究空白和最新技术,并强调了人工神经网络在行业内欺诈检测中的日益广泛应用。
{"title":"E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review","authors":"Abed Mutemi, F. Bação","doi":"10.26599/bdma.2023.9020023","DOIUrl":"https://doi.org/10.26599/bdma.2023.9020023","url":null,"abstract":": The e-commerce industry’s rapid growth, accelerated by the COVID-19 pandemic, has led to an alarming increase in digital fraud and associated losses. To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. While ML and data mining techniques are popular in fraud detection, specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth. Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context. To bridge this gap, our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis (PRISMA) methodology. We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape. Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs. Through our investigation, we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud. Our paper examines the research on these techniques as published in the past decade. Employing the PRISMA approach, we conducted a content analysis of 101 publications, identifying research gaps, recent techniques, and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":null,"pages":null},"PeriodicalIF":13.6,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141235310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 Bulletin of Science and Technology Computers and Applied Chemistry Equipment for Electronic Products Manufacturing Hebei Journal of Industrial Science and Technology Journal of Applied Sciences Journal of University of Science and Technology of China Printed Circuit Information Wuhan University Journal of Natural Sciences Virtual Reality Intelligent Hardware 模式识别与人工智能 控制与决策 电机与控制学报 Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science) 计算机研究与发展 计算机学报 自动化学报 电子科技大学学报 Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science) 中国图象图形学报 Journal of Radars 信息与控制 数据采集与处理 Jiqiren/Robot 西北工业大学学报 High Technology Letters Journal of Cybersecurity Scientia Sinica Informationis Big Data Mining and Analytics Visual Computing for Industry, Biomedicine, and Art Qinghua Daxue Xuebao/Journal of Tsinghua University 计算机辅助设计与图形学学报 电波科学学报 Journal of Biosafety and Biosecurity Blockchain-Research and Applications 建模与仿真(英文) 建模与仿真 Soc Netw 单片机与嵌入式系统应用 信息安全(英文) 数据挖掘 指挥信息系统与技术 通信世界 智能与融合网络(英文) 电磁分析与应用期刊(英文) 资源环境与信息工程(英文) 无线传感网络(英文) 高性能计算技术 中文信息学报 通信技术政策研究 Tsinghua Sci. Technol. 天线与传播(英文) 物联网技术 离散数学期刊(英文) 计算机应用 ZTE Communications 软件工程与应用(英文) 航空计算技术 智能控制与自动化(英文) 电路与系统(英文) 计算机工程 天线学报 仪表技术与传感器 海军航空工程学院学报 Comput Technol Appl 军事通信技术 计算机仿真 无线通信 现代电子技术(英文) Journal of Systems Science and Information 电脑和通信(英文) 无线工程与技术(英文) 无线互联科技 人工智能与机器人研究 计算机工程与设计 电路与系统学报 软件 通讯和计算机:中英文版 智能学习系统与应用(英文) 图像与信号处理 软件工程与应用 电力电子 现代非线性理论与应用(英文) 计算机科学 计算机科学与应用 物联网(英文) 数据与计算发展前沿 电信科学 自主智能(英文) 人工智能杂志(英文) 信号处理 人工智能技术学报(英文) 自主智能系统(英文) 信息通信技术 数据分析和信息处理(英文)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1