Fufang E’jiao Jiang(FEJ)as a healthy food consisting of medicine food homology materials approved by China’s Ministry of Health has been extensively applied to replenish qi and nourish blood,and it has a positive im...Fufang E’jiao Jiang(FEJ)as a healthy food consisting of medicine food homology materials approved by China’s Ministry of Health has been extensively applied to replenish qi and nourish blood,and it has a positive impact on women’s health.To find out the material basis and mechanism of FEJ,a systematic“compoundeffect-target”analysis including chemical composition resolution,zebrafish,network pharmacology,molecular docking,transcriptome,and bibliometric analysis was adopted.124 chemical components including ginsenosides,and phenylethanoid glycosides in FEJ were discovered,and effects of FEJ on promoting the generation of immune cells,erythropoiesis and angiogenesis in zebrafish were exhibited.Based on network pharmacology,molecular docking and in vivo activity assay,6 compounds including jionoside A1,isoacteoside,echinacoside,acteoside,lobetyolin,and rehmannioside D were identified as active components of FEJ.Transcriptome data showed that several pathways such as complement and coagulation cascades,ECM-receptor interaction,and PI3K-Akt signaling pathway were associated with proangiogenic effect of FEJ.19 common targets were obtained through combined analysis of network pharmacology and transcriptomics,and 5 targets of them were verified by PCR.The bibliometric analysis of these common targets revealed that FEJ was related to energy metabolism,pathway in cancer,etc.,which was consistent with the results of network pharmacology and transcriptome.The studies suggested that FEJ could replenish qi and nourish blood through multi-compound and multi-targets.展开更多
Vulnerability reports are essential for improving software security since they record key information on vulnerabilities.In a report,CWE denotes the weakness of the vulnerability and thus helps quickly understand the ...Vulnerability reports are essential for improving software security since they record key information on vulnerabilities.In a report,CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the vulner-ability.Therefore,CWE assignment is useful for categorizing newly discovered vulnerabilities.In this paper,we propose an automatic CwE assignment method with graph neural networks.First,we prepare a dataset that contains 3394 real world vulnerabilities from Linux,OpenSSL,Wireshark and many other software programs.Then,we extract state-ments with vulnerability syntax features from these vulnerabilities and use program slicing to slice them according to the categories of syntax features.On top of slices,we represent these slices with graphs that characterize the data dependency and control dependency between statements.Finally,we employ the graph neural networks to learn the hidden information from these graphs and leverage the Siamese network to compute the similarity between vulnerability functions,thereby assigning CWE IDs for these vulnerabilities.The experimental results show that the proposed method is effective compared to existing methods.展开更多
Microbes play multiple roles in the marine ecosystem,with a variety of functions. Luchao Port,Yangshan Port and Waigaoqiao Port are three major ports near the coast of Shanghai,and it is necessary to study the abundan...Microbes play multiple roles in the marine ecosystem,with a variety of functions. Luchao Port,Yangshan Port and Waigaoqiao Port are three major ports near the coast of Shanghai,and it is necessary to study the abundance and water environment of microbes. The distribution of hydrological and chemical characteristics shows that the distribution of temperature,salinity,dissolved oxygen and nutrient salt exhibit certain seasonal characteristics in the surface waters. Correlation analysis indicates that the temperature of surface waters is positively correlated with the number of microbes,but not very clear; salinity is significantly positively correlated with it; dissolved oxygen is negatively correlated with it; the correlation between nutrient salt and abundance of microbes is complicated,but not very significant( P > 0. 05).展开更多
1Introduction The existing privacy protection methods of trajectory data publication have two problems.First,existing methods[1-3]cannot resist attribute link attacks effectively.In practical scenarios,it is necessary...1Introduction The existing privacy protection methods of trajectory data publication have two problems.First,existing methods[1-3]cannot resist attribute link attacks effectively.In practical scenarios,it is necessary to integrate data from a variety of fields for data analysis,such as cross-domain recommendations.We usually need to obtain the user attributes outside of the trajectory data as background knowledge.展开更多
With the proliferation of the Internet,particularly the rise of social media,digital images have gradually become an important part of life,and trading platforms have emerged for buying and selling images.However,trad...With the proliferation of the Internet,particularly the rise of social media,digital images have gradually become an important part of life,and trading platforms have emerged for buying and selling images.However,traditional image trading service providers may disclose users’private information for profit.Additionally,many image trading platforms disregard the fairness of a transaction and the issue of copyright protection after an image is sold.This neglect harms the interests of users and affects their enthusiasm for trading.A secure way to safely transact images is needed.We proposed a copyright-preserving and fair image trading scheme based on blockchain,which combines amplifying locality-sensitive hashing with searchable symmetric encryption to achieve safe image retrieval on blockchain and ensure the credibility of the image retrieval process.Additionally,we use digital fingerprint and watermark technologies to realize the copyright protection of images and use smart contracts to achieve fair transaction processes.The experimental results show that our scheme can protect image copyrights and realize a fair trading process while ensuring efficiency.展开更多
Conversion of organic waste into engineered metal-biochar composite is an effective way of enhancing biochar’s efficiency for adsorptive capture of phosphorus(P)from aqueous media.Thus,various strategies have been cr...Conversion of organic waste into engineered metal-biochar composite is an effective way of enhancing biochar’s efficiency for adsorptive capture of phosphorus(P)from aqueous media.Thus,various strategies have been created for the production of metal-biochar composites;however,the complex preparation steps,high-cost metal salt reagent application,or extreme process equipment requirements involved in those strategies limited the large-scale production of metal-biochar composites.In this study,a novel biochar composite rich in magnesium oxides(MFBC)was directly produced through co-pyrolysis of magnesite with food waste;the product,MFBC was used to adsorptively capture P from solution and bio-liquid wastewater.The results showed that compared to the pristine food waste biochar,MFBC was a uniformly hybrid MgO biochar composite with a P capture capacity of 523.91 mg/g.The capture of P by MFBC was fitted using the Langmuir and pseudo-first-order kinetic models.The P adsorptive capture was controlled by MgHPO4 formation and electrostatic attraction,which was affected by the coexisting F−and CO_(3)^(2−)ions.MFBC could recover more than 98%of P from the solution and bio-liquid wastewater.Although the P-adsorbed MFBC showed very limited reusability but it can be substituted for phosphate fertiliser in agricultural practices.This study provided an innovative technology for preparing MgO-biochar composite against P recovery from aqueous media,and also highlighted high-value-added approaches for resource utilization of bio-liquid wastewater and food waste.展开更多
Intramedullary schwannoma of the upper cervical spinal cord is rarely reported in forensic medicine.We herein report a case involving a patient who died of compression from an intramedullary schwannoma in the upper ce...Intramedullary schwannoma of the upper cervical spinal cord is rarely reported in forensic medicine.We herein report a case involving a patient who died of compression from an intramedullary schwannoma in the upper cervical spinal cord.A 30-year-old man initially presented with a five-day history of pain in the left chest that progressed to weakening in the left arm.Although the patient was treated with analgesic poultices,he developed inspiratory dyspnoea and died while working the next day without having undergone any medical imaging examination or surgical treatment.Anatomical and histopathological examinations revealed an intramedullary schwannoma in the left cervical spinal cord(C_(3)-C_(5))underneath the spinal nerve root.The cause of death might have been asphyxia secondary to the tumour,which interfered with the nerve function in the respiratory muscles.This finding suggests that an autopsy is essential for pathologists and medicolegists to comprehensively undertake their due obligation to obtain“the first evidence”,especially when there is a lack of directly related evidence.As part of the central nervous system,the spinal cord could be systematically included in a routine pathological autopsy in some cases.展开更多
基金supported by the National Key R&D Program of China(2018YFC1707300)the Taishan Industrial Experts Program(tscx202211148).
文摘Fufang E’jiao Jiang(FEJ)as a healthy food consisting of medicine food homology materials approved by China’s Ministry of Health has been extensively applied to replenish qi and nourish blood,and it has a positive impact on women’s health.To find out the material basis and mechanism of FEJ,a systematic“compoundeffect-target”analysis including chemical composition resolution,zebrafish,network pharmacology,molecular docking,transcriptome,and bibliometric analysis was adopted.124 chemical components including ginsenosides,and phenylethanoid glycosides in FEJ were discovered,and effects of FEJ on promoting the generation of immune cells,erythropoiesis and angiogenesis in zebrafish were exhibited.Based on network pharmacology,molecular docking and in vivo activity assay,6 compounds including jionoside A1,isoacteoside,echinacoside,acteoside,lobetyolin,and rehmannioside D were identified as active components of FEJ.Transcriptome data showed that several pathways such as complement and coagulation cascades,ECM-receptor interaction,and PI3K-Akt signaling pathway were associated with proangiogenic effect of FEJ.19 common targets were obtained through combined analysis of network pharmacology and transcriptomics,and 5 targets of them were verified by PCR.The bibliometric analysis of these common targets revealed that FEJ was related to energy metabolism,pathway in cancer,etc.,which was consistent with the results of network pharmacology and transcriptome.The studies suggested that FEJ could replenish qi and nourish blood through multi-compound and multi-targets.
基金The research was supported in part by the National Natural Science Foundation of China(Nos.62166004,U21A20474)the Guangxi Science and Technology Major Project(No.AA22068070)+1 种基金the Guangxi Natural Science Foundation(No.2020GXNSFAA297075)the Center for Applied Mathematics of Guangxi,the Guangxi"Bagui Scholar"Teams for Innovation and Research Project,the Guangxi Talent Highland Project of Big Data Intelligence and Application,the Guangxi Collaborative Center of Multisource Information Integration and Intelligent Processing and Fundamental Research Funds for the Central Universities(No.2021JKF06).
文摘Vulnerability reports are essential for improving software security since they record key information on vulnerabilities.In a report,CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the vulner-ability.Therefore,CWE assignment is useful for categorizing newly discovered vulnerabilities.In this paper,we propose an automatic CwE assignment method with graph neural networks.First,we prepare a dataset that contains 3394 real world vulnerabilities from Linux,OpenSSL,Wireshark and many other software programs.Then,we extract state-ments with vulnerability syntax features from these vulnerabilities and use program slicing to slice them according to the categories of syntax features.On top of slices,we represent these slices with graphs that characterize the data dependency and control dependency between statements.Finally,we employ the graph neural networks to learn the hidden information from these graphs and leverage the Siamese network to compute the similarity between vulnerability functions,thereby assigning CWE IDs for these vulnerabilities.The experimental results show that the proposed method is effective compared to existing methods.
基金Supported by Social Development Fund of Shanghai Science and Technology Commission(09DZ120010C)
文摘Microbes play multiple roles in the marine ecosystem,with a variety of functions. Luchao Port,Yangshan Port and Waigaoqiao Port are three major ports near the coast of Shanghai,and it is necessary to study the abundance and water environment of microbes. The distribution of hydrological and chemical characteristics shows that the distribution of temperature,salinity,dissolved oxygen and nutrient salt exhibit certain seasonal characteristics in the surface waters. Correlation analysis indicates that the temperature of surface waters is positively correlated with the number of microbes,but not very clear; salinity is significantly positively correlated with it; dissolved oxygen is negatively correlated with it; the correlation between nutrient salt and abundance of microbes is complicated,but not very significant( P > 0. 05).
基金supported in part by the Guangxi"Bagui Sechola"Teams and the Guangxi Natural Science Foundation(2020JA170023).
文摘1Introduction The existing privacy protection methods of trajectory data publication have two problems.First,existing methods[1-3]cannot resist attribute link attacks effectively.In practical scenarios,it is necessary to integrate data from a variety of fields for data analysis,such as cross-domain recommendations.We usually need to obtain the user attributes outside of the trajectory data as background knowledge.
基金the National Natural Science Foundation of China (Grant Nos.61662008,61272535, 61502111)Guangxi "Bagui Scholar"Teams for Innovation and Research Project,Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing,Guangxi Natural Science Foundation (2015GXNSFBA139246,2014GXNSFBAl18288and 2013GXNSFBA019263) Guangxi Special Project of Science and Technology Base and Talents (AD16380008).
基金supported by the National Natural Science Foundation of China(Nos.62062016,U21A20474)Guangxi Natural Science Foundation(No.2019JJA170060)+1 种基金Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201)Guangxi Science and Technology project(Nos.GuikeAA22067070,GuikeAD21220114).
文摘With the proliferation of the Internet,particularly the rise of social media,digital images have gradually become an important part of life,and trading platforms have emerged for buying and selling images.However,traditional image trading service providers may disclose users’private information for profit.Additionally,many image trading platforms disregard the fairness of a transaction and the issue of copyright protection after an image is sold.This neglect harms the interests of users and affects their enthusiasm for trading.A secure way to safely transact images is needed.We proposed a copyright-preserving and fair image trading scheme based on blockchain,which combines amplifying locality-sensitive hashing with searchable symmetric encryption to achieve safe image retrieval on blockchain and ensure the credibility of the image retrieval process.Additionally,we use digital fingerprint and watermark technologies to realize the copyright protection of images and use smart contracts to achieve fair transaction processes.The experimental results show that our scheme can protect image copyrights and realize a fair trading process while ensuring efficiency.
基金The National Natural Science Foundation of China(31902122,32172679)the National College Students Innovation and Entrepreneurship Training Programs of China(2020).
文摘Conversion of organic waste into engineered metal-biochar composite is an effective way of enhancing biochar’s efficiency for adsorptive capture of phosphorus(P)from aqueous media.Thus,various strategies have been created for the production of metal-biochar composites;however,the complex preparation steps,high-cost metal salt reagent application,or extreme process equipment requirements involved in those strategies limited the large-scale production of metal-biochar composites.In this study,a novel biochar composite rich in magnesium oxides(MFBC)was directly produced through co-pyrolysis of magnesite with food waste;the product,MFBC was used to adsorptively capture P from solution and bio-liquid wastewater.The results showed that compared to the pristine food waste biochar,MFBC was a uniformly hybrid MgO biochar composite with a P capture capacity of 523.91 mg/g.The capture of P by MFBC was fitted using the Langmuir and pseudo-first-order kinetic models.The P adsorptive capture was controlled by MgHPO4 formation and electrostatic attraction,which was affected by the coexisting F−and CO_(3)^(2−)ions.MFBC could recover more than 98%of P from the solution and bio-liquid wastewater.Although the P-adsorbed MFBC showed very limited reusability but it can be substituted for phosphate fertiliser in agricultural practices.This study provided an innovative technology for preparing MgO-biochar composite against P recovery from aqueous media,and also highlighted high-value-added approaches for resource utilization of bio-liquid wastewater and food waste.
文摘Intramedullary schwannoma of the upper cervical spinal cord is rarely reported in forensic medicine.We herein report a case involving a patient who died of compression from an intramedullary schwannoma in the upper cervical spinal cord.A 30-year-old man initially presented with a five-day history of pain in the left chest that progressed to weakening in the left arm.Although the patient was treated with analgesic poultices,he developed inspiratory dyspnoea and died while working the next day without having undergone any medical imaging examination or surgical treatment.Anatomical and histopathological examinations revealed an intramedullary schwannoma in the left cervical spinal cord(C_(3)-C_(5))underneath the spinal nerve root.The cause of death might have been asphyxia secondary to the tumour,which interfered with the nerve function in the respiratory muscles.This finding suggests that an autopsy is essential for pathologists and medicolegists to comprehensively undertake their due obligation to obtain“the first evidence”,especially when there is a lack of directly related evidence.As part of the central nervous system,the spinal cord could be systematically included in a routine pathological autopsy in some cases.