Objective:Pancreatic ductal adenocarcinoma(PDAC)is an aggressive malignancy.CD8^(+)T cells,cancer stem cells(CSCs),and tumor budding(TB)have been significantly correlated with the outcome of patients with PDAC,but the...Objective:Pancreatic ductal adenocarcinoma(PDAC)is an aggressive malignancy.CD8^(+)T cells,cancer stem cells(CSCs),and tumor budding(TB)have been significantly correlated with the outcome of patients with PDAC,but the correlations have been independently reported.In addition,no integrated immune-CSC-TB profile for predicting survival in patients with PDAC has been established.Methods:Multiplexed immunofluorescence and artificial intelligence(AI)-based comprehensive analyses were used for quantification and spatial distribution analysis of CD8^(+)T cells,CD133^(+)CSCs,and TB.In vivo humanized patient-derived xenograft(PDX)models were established.Nomogram analysis,calibration curve,time-dependent receiver operating characteristic curve,and decision curve analyses were performed using R software.Results:The established‘anti-/pro-tumor’models showed that the CD8^(+)T cell/TB,CD8^(+)T cell/CD133^(+)CSC,TB-adjacent CD8^(+)T cell,and CD133^(+)CSC-adjacent CD8^(+)T cell indices were positively associated with survival of patients with PDAC.These findings were validated using PDX-transplanted humanized mouse models.An integrated nomogram-based immune-CSC-TB profile that included the CD8^(+)T cell/TB and CD8^(+)T cell/CD133^(+)CSC indices was established and shown to be superior to the tumor-nodemetastasis stage model in predicting survival of patients with PDAC.Conclusions:‘Anti-/pro-tumor’models and the spatial relationship among CD8^(+)T cells,CSCs,and TB within the tumor microenvironment were investigated.Novel strategies to predict the prognosis of patients with PDAC were established using AI-based comprehensive analysis and machine learning workflow.The nomogram-based immune-CSC-TB profile can provide accurate prognosis prediction for patients with PDAC.展开更多
Despite major improvements in cancer survival,metastasis is responsible for almost 90%of cancer-related mortality^(1,2).Nonetheless,the pathogenesis and molecular mechanisms of cancer metastasis remain poorly understood.
Diabetic foot ulcers are one of the most severe complications of diabetes that have imposed great financial and psychological burdens on diabetic patients.A Nocardia rubra cell wall skeleton(Nr-CWS)can be externally a...Diabetic foot ulcers are one of the most severe complications of diabetes that have imposed great financial and psychological burdens on diabetic patients.A Nocardia rubra cell wall skeleton(Nr-CWS)can be externally applied to accelerate wound healing.However,its clinical application has not yet been reported.Herein,we report two patients with diabetic foot ulcers treated with Nr-CWS.After wound debridement,the wound was covered with a sterile cotton ball infiltrated with an Nr-CWS that was diluted with 2.0 mL of saline.The covers were changed every two days until complete wound healing occurred.The two wounds healed after 3 and 12 weeks,respectively.This article aims to provide a new treatment for diabetic foot ulcers,with the hope that physicians may consider an Nr-CWS as a complementary method for the treatment of chronic wounds.展开更多
Data centers,the engines of the global Internet,rely on powerful high-speed optical interconnects.In optical fiber communication,classic direct detection captures only the intensity of the optical field,while the cohe...Data centers,the engines of the global Internet,rely on powerful high-speed optical interconnects.In optical fiber communication,classic direct detection captures only the intensity of the optical field,while the coherent detection counterpart utilizes both phase and polarization diversities at the expense of requiring a narrow-linewidth and high-stability local oscillator(LO).Herein,we propose and demonstrate a four-dimensional Jones-space optical field recovery(4-D JSFR)scheme without an LO.The polarization-diverse full-field receiver structure captures information encoded in the intensity and phase of both polarizations,which can be subsequently extracted digitally.To our knowledge,our proposed receiver achieves the highest electrical spectral efficiency among existing direct detection systems and potentially provides similar electrical spectral efficiency as standard intradyne coherent detection systems.The fully recovered optical field extends the transmission distance beyond the limitations imposed by fiber chromatic dispersion.Moreover,the LO-free advantage makes 4-D JSFR suitable for photonic integration,offering a spectrally efficient and cost-effective solution for massively parallel data center interconnects.Our results may contribute to the ongoing developments in the theory of optical field recovery and the potential design considerations for future high-speed optical transceivers.展开更多
Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is ...Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols.展开更多
The secure key rate of quantum key distribution(QKD)is greatly reduced because of the untrusted devices.In this paper,to raise the secure key rate of QKD,a device-independent quantum key distribution(DIQKD)protocol is...The secure key rate of quantum key distribution(QKD)is greatly reduced because of the untrusted devices.In this paper,to raise the secure key rate of QKD,a device-independent quantum key distribution(DIQKD)protocol is proposed based on hyper-entangled states and Bell inequalities.The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition.Based on the formalization of Clauser-Horne Shimony-Holt(CHSH)violation measurement on local correlation,the probability of a secure secret bit is obtained,which is produced by a pair of hyper-entangled particles.By analyzing the secure secret bit,it is proven that,when both the polarization mode and the path mode contains entangled-states,the DIQKD protocol gets a better secure key rate than common Bell states.展开更多
In order to enable two parties to exchange their secret information equally,we propose a controlled quantum dialogue protocol based on quantum walks,which implements the equal exchange of secret information between th...In order to enable two parties to exchange their secret information equally,we propose a controlled quantum dialogue protocol based on quantum walks,which implements the equal exchange of secret information between the two parties with the help of the controller TP.The secret information is transmitted via quantum walks,by using this method,the previously required entangled particles do not need to be prepared in the initial phase,and the entangled particles can be produced spontaneously via quantum walks.Furthermore,to resist TP’s dishonest behavior,we use a hash function to verify the correctness of the secret information.The protocol analysis shows that it is safe and reliable facing some attacks,including intercept-measure-resend attack,entanglement attack,dishonest controller’s attack and participant attack.And has a slightly increasing efficiency comparing with the previous protocols.Note that the proposed protocol may be feasible because quantum walks prove to be implemented in different physical systems and experiments.展开更多
The generating function methods have been applied successfully to generalized Hamiltonian systems with constant or invertible Poisson-structure matrices.In this paper,we extend these results and present the generating...The generating function methods have been applied successfully to generalized Hamiltonian systems with constant or invertible Poisson-structure matrices.In this paper,we extend these results and present the generating function methods preserving the Poisson structures for generalized Hamiltonian systems with general variable Poisson-structure matrices.In particular,some obtained Poisson schemes are applied efficiently to some dynamical systems which can be written into generalized Hamiltonian systems(such as generalized Lotka-Volterra systems,Robbins equations and so on).展开更多
The Hagedorn wavepacket method is an important numerical method for solving the semiclassical time-dependent Schrödinger equation.In this paper,a new semi-discretization in space is obtained by wavepacket operato...The Hagedorn wavepacket method is an important numerical method for solving the semiclassical time-dependent Schrödinger equation.In this paper,a new semi-discretization in space is obtained by wavepacket operator.In a sense,such semi-discretization is equivalent to the Hagedorn wavepacket method,but this discretization is more intuitive to show the advantages of wavepacket methods.Moreover,we apply the multi-time-step method and the Magnus-expansion to obtain the improved algorithms in time-stepping computation.The improved algorithms are of the Gauss–Hermite spec-tral accuracy to approximate the analytical solution of the semiclassical Schrödinger equation.And for the given accuracy,the larger time stepsize can be used for the higher oscillation in the semiclassical Schrödinger equation.The superiority is shown by the error estimation and numerical experiments.展开更多
基金supported by The Science&Technology Development Fund of Tianjin Education Commission for Higher Education(Grant No.2017KJ198)。
文摘Objective:Pancreatic ductal adenocarcinoma(PDAC)is an aggressive malignancy.CD8^(+)T cells,cancer stem cells(CSCs),and tumor budding(TB)have been significantly correlated with the outcome of patients with PDAC,but the correlations have been independently reported.In addition,no integrated immune-CSC-TB profile for predicting survival in patients with PDAC has been established.Methods:Multiplexed immunofluorescence and artificial intelligence(AI)-based comprehensive analyses were used for quantification and spatial distribution analysis of CD8^(+)T cells,CD133^(+)CSCs,and TB.In vivo humanized patient-derived xenograft(PDX)models were established.Nomogram analysis,calibration curve,time-dependent receiver operating characteristic curve,and decision curve analyses were performed using R software.Results:The established‘anti-/pro-tumor’models showed that the CD8^(+)T cell/TB,CD8^(+)T cell/CD133^(+)CSC,TB-adjacent CD8^(+)T cell,and CD133^(+)CSC-adjacent CD8^(+)T cell indices were positively associated with survival of patients with PDAC.These findings were validated using PDX-transplanted humanized mouse models.An integrated nomogram-based immune-CSC-TB profile that included the CD8^(+)T cell/TB and CD8^(+)T cell/CD133^(+)CSC indices was established and shown to be superior to the tumor-nodemetastasis stage model in predicting survival of patients with PDAC.Conclusions:‘Anti-/pro-tumor’models and the spatial relationship among CD8^(+)T cells,CSCs,and TB within the tumor microenvironment were investigated.Novel strategies to predict the prognosis of patients with PDAC were established using AI-based comprehensive analysis and machine learning workflow.The nomogram-based immune-CSC-TB profile can provide accurate prognosis prediction for patients with PDAC.
基金supported by the National Key Research and Development Program of China(2021YFA1201100)National Natural Science Foundation of China(Grant Nos.82072716,81802433,82030092,81720108028,82072657,82072659,82173295,81871968,81871978,and 82103006)+2 种基金Tianjin Natural Science Foundation(Grant No.20JCQNJC01330)Collaboration Program of Beijing Tianjin and Hebei(Grant No.22JCZXJC00120)Tianjin Research Innovation Project for Postgraduate Students(Grant No.2021YJSB262)。
文摘Despite major improvements in cancer survival,metastasis is responsible for almost 90%of cancer-related mortality^(1,2).Nonetheless,the pathogenesis and molecular mechanisms of cancer metastasis remain poorly understood.
基金This study was sponsored by the National Natural Science Foundation of China(grant no.82172224).
文摘Diabetic foot ulcers are one of the most severe complications of diabetes that have imposed great financial and psychological burdens on diabetic patients.A Nocardia rubra cell wall skeleton(Nr-CWS)can be externally applied to accelerate wound healing.However,its clinical application has not yet been reported.Herein,we report two patients with diabetic foot ulcers treated with Nr-CWS.After wound debridement,the wound was covered with a sterile cotton ball infiltrated with an Nr-CWS that was diluted with 2.0 mL of saline.The covers were changed every two days until complete wound healing occurred.The two wounds healed after 3 and 12 weeks,respectively.This article aims to provide a new treatment for diabetic foot ulcers,with the hope that physicians may consider an Nr-CWS as a complementary method for the treatment of chronic wounds.
基金National Key Research and Development Program of China(2020YFB1806401)National Natural Science Foundation of China(62001287,62201308,62271305)。
文摘Data centers,the engines of the global Internet,rely on powerful high-speed optical interconnects.In optical fiber communication,classic direct detection captures only the intensity of the optical field,while the coherent detection counterpart utilizes both phase and polarization diversities at the expense of requiring a narrow-linewidth and high-stability local oscillator(LO).Herein,we propose and demonstrate a four-dimensional Jones-space optical field recovery(4-D JSFR)scheme without an LO.The polarization-diverse full-field receiver structure captures information encoded in the intensity and phase of both polarizations,which can be subsequently extracted digitally.To our knowledge,our proposed receiver achieves the highest electrical spectral efficiency among existing direct detection systems and potentially provides similar electrical spectral efficiency as standard intradyne coherent detection systems.The fully recovered optical field extends the transmission distance beyond the limitations imposed by fiber chromatic dispersion.Moreover,the LO-free advantage makes 4-D JSFR suitable for photonic integration,offering a spectrally efficient and cost-effective solution for massively parallel data center interconnects.Our results may contribute to the ongoing developments in the theory of optical field recovery and the potential design considerations for future high-speed optical transceivers.
文摘Quantum authorization management(QAM)is the quantum scheme for privilege management infrastructure(PMI)problem.Privilege management(authorization management)includes authentication and authorization.Authentication is to verify a user’s identity.Authorization is the process of verifying that a authenticated user has the authority to perform a operation,which is more fine-grained.In most classical schemes,the authority management center(AMC)manages the resources permissions for all network nodes within the jurisdiction.However,the existence of AMC may be the weakest link of the whole scheme.In this paper,a protocol for QAM without AMC is proposed based on entanglement swapping.In this protocol,Bob(the owner of resources)authenticates the legality of Alice(the user)and then shares the right key for the resources with Alice.Compared with the other existed QAM protocols,this protocol not only implements authentication,but also authorizes the user permissions to access certain resources or carry out certain actions.The authority division is extended to fin-grained rights division.The security is analyzed from the four aspects:the outsider’s attack,the user’s attack,authentication and comparison with the other two QAM protocols.
基金This work is supported by NSFC(Grant Nos.61572086,61402058)the Application Foundation Project of Sichuan Province of China(Grant No.2017JY0168)+3 种基金the National Key Research and Development Program(No.2017YFB0802302)Sichuan innovation team of quantum security communication(No.17TD0009)Sichuan academic and technical leaders training funding support projects(No.2016120080102643)the Fund for Middle and Young Academic Leaders of CUIT(Grant No.J201511).
文摘The secure key rate of quantum key distribution(QKD)is greatly reduced because of the untrusted devices.In this paper,to raise the secure key rate of QKD,a device-independent quantum key distribution(DIQKD)protocol is proposed based on hyper-entangled states and Bell inequalities.The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition.Based on the formalization of Clauser-Horne Shimony-Holt(CHSH)violation measurement on local correlation,the probability of a secure secret bit is obtained,which is produced by a pair of hyper-entangled particles.By analyzing the secure secret bit,it is proven that,when both the polarization mode and the path mode contains entangled-states,the DIQKD protocol gets a better secure key rate than common Bell states.
基金This work is supported by the National Natural Science Foundation of China(Nos.61572086 and 61402058)the Key Research and Development Project of Sichuan Province(Nos.20ZDYF2324,2019ZYD027 and 2018TJPT0012)+3 种基金the Innovation Team of Quantum Security Communication of Sichuan Province(No.17TD0009)the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province(No.2016120080102643)the Application Foundation Project of Sichuan Province(No.2017JY0168)the Science and Technology Support Project of Sichuan Province(Nos.2018GZ0204 and 2016FZ0112).
文摘In order to enable two parties to exchange their secret information equally,we propose a controlled quantum dialogue protocol based on quantum walks,which implements the equal exchange of secret information between the two parties with the help of the controller TP.The secret information is transmitted via quantum walks,by using this method,the previously required entangled particles do not need to be prepared in the initial phase,and the entangled particles can be produced spontaneously via quantum walks.Furthermore,to resist TP’s dishonest behavior,we use a hash function to verify the correctness of the secret information.The protocol analysis shows that it is safe and reliable facing some attacks,including intercept-measure-resend attack,entanglement attack,dishonest controller’s attack and participant attack.And has a slightly increasing efficiency comparing with the previous protocols.Note that the proposed protocol may be feasible because quantum walks prove to be implemented in different physical systems and experiments.
基金projects NSF of China(11271311)Program for Changjiang Scholars and Innovative Research Team in University of China(IRT1179)the Aid Program for Science and Technology,Innovative Research Team in Higher Educational Institutions of Hunan Province of China,and Hunan Province Innovation Foundation for Postgraduate(CX2011B245).
文摘The generating function methods have been applied successfully to generalized Hamiltonian systems with constant or invertible Poisson-structure matrices.In this paper,we extend these results and present the generating function methods preserving the Poisson structures for generalized Hamiltonian systems with general variable Poisson-structure matrices.In particular,some obtained Poisson schemes are applied efficiently to some dynamical systems which can be written into generalized Hamiltonian systems(such as generalized Lotka-Volterra systems,Robbins equations and so on).
基金supported by projects NSF of China(11271311)Program for Changjiang Scholars and Innovative Research Team in University of China(IRT1179)Hunan Province Innovation Foundation for Postgraduate(CX2011B245).
文摘The Hagedorn wavepacket method is an important numerical method for solving the semiclassical time-dependent Schrödinger equation.In this paper,a new semi-discretization in space is obtained by wavepacket operator.In a sense,such semi-discretization is equivalent to the Hagedorn wavepacket method,but this discretization is more intuitive to show the advantages of wavepacket methods.Moreover,we apply the multi-time-step method and the Magnus-expansion to obtain the improved algorithms in time-stepping computation.The improved algorithms are of the Gauss–Hermite spec-tral accuracy to approximate the analytical solution of the semiclassical Schrödinger equation.And for the given accuracy,the larger time stepsize can be used for the higher oscillation in the semiclassical Schrödinger equation.The superiority is shown by the error estimation and numerical experiments.