BACKGROUND Hospice care plays an important role in improving the quality of life of advanced cancer patients,but controversy remains over whether age affects the attitudes of family members toward hospice care.AIM To ...BACKGROUND Hospice care plays an important role in improving the quality of life of advanced cancer patients,but controversy remains over whether age affects the attitudes of family members toward hospice care.AIM To investigate the attitudes of family members of advanced cancer patients of different ages toward hospice care.METHODS The study participants were 175 family members of patients with advanced cancer from January 2020 and October 2022.The participants were divided into youth(<40 years,n=65),middle-aged(40–60 years,n=59),and elderly(>60 years,n=51)groups.Researchers investigated and compared the degree of awareness regarding hospice care,attitudes,and whether the family members of patients would choose hospice care.RESULTS Among the family members of 175 patients,approximately 28%(49/175)were aware of hospice care.Awareness of hospice care,the proportion of hospice care acceptance and adaptation attitudes,and the proportion of those who chose hospice care in the youth group were higher in the middle-aged and elderly groups(P<0.05).No statistically significant difference was found in these three indicators between the middle-aged and elderly groups(P>0.05).Hospice care was chosen mainly to relieve pain and reduce unnecessary treatment,whereas the reasons for not choosing hospice care were mainly distrust and ethical concerns.CONCLUSION The family members of patients with advanced cancer had relatively low awareness of hospice care,while youth had a higher awareness of hospice care,acceptance,and adaptation attitudes,and were more willing to choose hospice care.展开更多
Objective: To investigate the associated collateral stigma of the family members of schizophrenia patients and analyze its current status and influencing factors. Methods: The Link Depreciation-Discrimination Percepti...Objective: To investigate the associated collateral stigma of the family members of schizophrenia patients and analyze its current status and influencing factors. Methods: The Link Depreciation-Discrimination Perception Scale was used to investigate the status quo of the associated stigma of the family members of 169 schizophrenia patients diagnosed in 4 hospitals in a certain province. The results of the investigation were analyzed and summarized. Results: The detection rate of stigma associated with the family members of schizophrenia patients was 72.78%, with a score of 28.41 ± 3.92 points. The main influencing factors were the family member’s education level, the patient’s illness duration, the family member’s occupation, and the family-patient relationship. Conclusion: The detection rate of stigma associated with schizophrenia was relatively high. This requires increased attention and appropriate nursing intervention.展开更多
Tubular members subject to combined pitting corrosion and crack damage were numerically studied to clarify the reduction of ultimate strength and failure behavior,based on numerical models validated against available ...Tubular members subject to combined pitting corrosion and crack damage were numerically studied to clarify the reduction of ultimate strength and failure behavior,based on numerical models validated against available experi-ments.The effects of length,location and inclined angle of a crack under combined damage were studied to disclose the mechanism of interaction between the crack and corrosion pits.The methods,named as linear superposition directly accumulating the effects of solo crack and solo pitting damage,as well as crack projection transferring an inclined crack to a transverse one,were discussed and verified in the view of assessing ultimate strength of tubular members with combined damage.It was shown that the former is practical but complex while the next always over-estimates the residual strength.Besides,the location and inclined angle of a crack have a subtle effect on the reduction of ultimate strength under combined damage,especially at higher level of pitting damage,due to the synergistic effect between corrosion pits and cracks.Such effect can lead to early occurrence of plasticity and local buckling by inducing stress interaction between crack tips and pits,and causing more significant strength reduction compared with a solo type of damage.A practical method was proposed to determine the loss ratio of cross-sectional area on the equivalent weakest section of a damaged member.Based on the loss ratio,a formula was presented to predict the ultimate strength of damaged members with combined damage,showing good applicability.展开更多
To clarify the formation and distribution of feldspar dissolution pores and predict the distribution of high-quality reservoir in gravity flow sandstone of the 7^(th) member of Triassic Yanchang Formation(Chang 7 Memb...To clarify the formation and distribution of feldspar dissolution pores and predict the distribution of high-quality reservoir in gravity flow sandstone of the 7^(th) member of Triassic Yanchang Formation(Chang 7 Member)in the Ordos Basin,thin sections,scanning electron microscopy,energy spectrum analysis,X-ray diffraction whole rock analysis,and dissolution experiments are employed in this study to investigate the characteristics and control factors of feldspar dissolution pores.The results show that:(1)Three types of diagenetic processes are observed in the feldspar of Chang 7 sandstone in the study area:secondary overgrowth of feldspar,replacement by clay and calcite,and dissolution of detrital feldspar.(2)The feldspar dissolution of Chang 7 tight sandstone is caused by organic acid,and is further affected by the type of feldspar,the degree of early feldspar alteration,and the buffering effect of mica debris on organic acid.(3)Feldspars have varying degrees of dissolution.Potassium feldspar is more susceptible to dissolution than plagioclase.Among potassium feldspar,orthoclase is more soluble than microcline,and unaltered feldspar is more soluble than early kaolinized or sericitized feldspar.(4)The dissolution experiment demonstrated that the presence of mica can hinder the dissolution of feldspar.Mica of the same mass has a significantly stronger capacity to consume organic acids than feldspar.(5)Dissolution pores in feldspar of Chang 7 Member are more abundant in areas with low mica content,and they improve the reservoir physical properties,while in areas with high mica content,the number of feldspar dissolution pores decreases significantly.展开更多
BACKGROUND Alzheimer’s disease(AD)is a neurodegenerative condition characterized by oxidative stress and neuroinflammation.Tanshinone ⅡA(Tan-ⅡA),a bioactive compound isolated from Salvia miltiorrhiza plants,has sho...BACKGROUND Alzheimer’s disease(AD)is a neurodegenerative condition characterized by oxidative stress and neuroinflammation.Tanshinone ⅡA(Tan-ⅡA),a bioactive compound isolated from Salvia miltiorrhiza plants,has shown potential neuroprotective effects;however,the mechanisms underlying such a function remain unclear.AIM To investigate potential Tan-ⅡA neuroprotective effects in AD and to elucidate their underlying mechanisms.METHODS Hematoxylin and eosin staining was utilized to analyze structural brain tissue morphology.To assess changes in oxidative stress and neuroinflammation,we performed enzyme-linked immunosorbent assay and western blotting.Additionally,the effect of Tan-ⅡA on AD cell models was evaluated in vitro using the 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide assay.Genetic changes related to the long non-coding RNA(lncRNA)nuclear-enriched abundant transcript 1(NEAT1)/microRNA(miRNA,miR)-291a-3p/member RAS oncogene family Rab22a axis were assessed through reverse transcription quantitative polymerase chain reaction.RESULTS In vivo,Tan-ⅡA treatment improved neuronal morphology and attenuated oxidative stress and neuroinflammation in the brain tissue of AD mice.In vitro experiments showed that Tan-ⅡA dose-dependently ameliorated the amyloid-beta 1-42-induced reduction of neural stem cell viability,apoptosis,oxidative stress,and neuroinflammation.In this process,the lncRNA NEAT1-a potential therapeutic target-is highly expressed in AD mice and downregulated via Tan-ⅡA treatment.Mechanistically,NEAT1 promotes the transcription and translation of Rab22a via miR-291a-3p,which activates nuclear factor kappa-B(NF-κB)signaling,leading to activation of the pro-apoptotic B-cell lymphoma 2-associated X protein and inhibition of the anti-apoptotic B-cell lymphoma 2 protein,which exacerbates AD.Tan-ⅡA intervention effectively blocked this process by inhibiting the NEAT1/miR-291a-3p/Rab22a axis and NF-κB signaling.CONCLUSION This study demonstrates that Tan-ⅡA exerts neuroprotective effects in AD by modulating the NEAT1/miR-291a-3p/Rab22a/NF-κB signaling pathway,serving as a foundation for the development of innovative approaches for AD therapy.展开更多
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e...The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.展开更多
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul...Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.展开更多
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism...First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy.展开更多
As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have pro...As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have proper trust in medical machines.Intelligent machines that have applied machine learning(ML)technologies continue to penetrate deeper into the medical environment,which also places higher demands on intelligent healthcare.In order to make machines play a role in HMI in healthcare more effectively and make human‐machine cooperation more harmonious,the authors need to build good humanmachine trust(HMT)in healthcare.This article provides a systematic overview of the prominent research on ML and HMT in healthcare.In addition,this study explores and analyses ML and three important factors that influence HMT in healthcare,and then proposes a HMT model in healthcare.Finally,general trends are summarised and issues to consider addressing in future research on HMT in healthcare are identified.展开更多
Recent advances in hydrocarbon exploration have been made in the Member Deng-2 marginal microbial mound-bank complex reservoirs of the Dengying Formation in the western Sichuan Basin, SW China,where the depositional p...Recent advances in hydrocarbon exploration have been made in the Member Deng-2 marginal microbial mound-bank complex reservoirs of the Dengying Formation in the western Sichuan Basin, SW China,where the depositional process is regarded confusing. The microfacies, construction types, and depositional model of the Member Deng-2 marginal microbial mound-bank complex have been investigated using unmanned aerial vehicle photography, outcrop section investigation, thin section identification,and seismic reflections in the southwestern Sichuan Basin. The microbialite lithologic textures in this region include thrombolite, dendrolite, stromatolite, fenestral stromatolite, spongiostromata stone,oncolite, aggregated grainstone, and botryoidal grapestone. Based on the comprehensive analysis of“depositional fabrics-lithology-microfacies”, an association between a fore mound, mound framework,and back mound subfacies has been proposed based on water depth, current direction, energy level and lithologic assemblages. The microfacies of the mound base, mound core, mound flank, mound cap, and mound flat could be recognized among the mound framework subfacies. Two construction types of marginal microbial mound-bank complex have been determined based on deposition location, mound scale, migration direction, and sedimentary facies association. Type Jinkouhe microbial mound constructions(TJMMCs) develop along the windward margin owing to their proximity to the seaward subfacies fore mound, with a northeastwardly migrated microbial mound on top of the mud mound,exhibiting the characteristics of large-sized mounds and small-sized banks in the surrounding area. Type E'bian microbial mound constructions(TEMMCs) primarily occur on the leeward margin, resulting from the presence of onshore back mound subfacies, with the smaller southwestward migrated microbial mounds existing on a thicker microbial flat. The platform margin microbial mound depositional model can be correlated with certain lateral comparison profile and seismic reflection structures in the 2D seismic section, which can provide references for future worldwide exploration. Microbial mounds with larger buildups and thicker vertical reservoirs are typically targeted on the windward margin, while small-sized microbial mounds and flats with better lateral connections are typically focused on the leeward margin.展开更多
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra...Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss.展开更多
The types,occurrence and composition of authigenic clay minerals in argillaceous limestone of sepiolite-bearing strata of the first member of the Middle Permian Maokou Formation(Mao-1 Member)in eastern Sichuan Basin w...The types,occurrence and composition of authigenic clay minerals in argillaceous limestone of sepiolite-bearing strata of the first member of the Middle Permian Maokou Formation(Mao-1 Member)in eastern Sichuan Basin were investigated through outcrop section measurement,core observation,thin section identification,argon ion polishing,X-ray diffraction,scanning electron microscope,energy spectrum analysis and laser ablation-inductively coupled plasma-mass spectrometry.The diagenetic evolution sequence of clay minerals was clarified,and the sedimentary-diagenetic evolution model of clay minerals was established.The results show that authigenic sepiolite minerals were precipitated in the Si4+and Mg2+-rich cool aragonite sea and sepiolite-bearing strata were formed in the Mao-1 Member.During burial diagenesis,authigenic clay minerals undergo two possible evolution sequences.First,from the early diagenetic stage A to the middle diagenetic stage A1,the sepiolite kept stable in the shallow-buried environment lack of Al3+.It began to transform into stevensite in the middle diagenetic stage A2,and then evolved into disordered talc in the middle diagenetic stage B1and finally into talc in the period from the middle diagenetic stage B2to the late diagenetic stage.Thus,the primary diagenetic evolution sequence of authigenic clay minerals,i.e.sepiolite-stevensite-disordered talc-talc,was formed in the Mao-1 Member.Second,in the early diagenetic stage A,as Al3+carried by the storm and upwelling currents was involved in the diagenetic process,trace of sepiolite started to evolve into smectite,and a part of smectite turned into chlorite.From the early diagenetic stage B to the middle diagenesis stage A1,a part of smectite evolved to illite/smectite mixed layer(I/S).The I/S evolved initially into illite from the middle diagenesis stage A2to the middle diagenesis stage B2,and then totally into illite in the late diagenesis stage.Thus,the secondary diagenetic evolution sequence of authigenic clay minerals,i.e.sepiolite-smectite-chlorite/illite,was formed in the Mao-1 Member.The types and evolution of authigenic clay minerals in argillaceous limestone of sepiolite-bearing strata are significant for petroleum geology in two aspects.First,sepiolite can adsorb and accumulate a large amount of organic matters,thereby effectively improving the quality and hydrocarbon generation potential of the source rocks of the Mao-1 Member.Second,the evolution from sepiolite to talc is accompanied by the formation of numerous organic matter pores and clay shrinkage pores/fractures,as well as the releasing of the Mg2+-rich diagenetic fluid,which allows for the dolomitization of limestone within or around the sag.As a result,the new assemblages of self-generation and self-accumulation,and lower/side source and upper/lateral reservoir,are created in the Middle Permian,enhancing the hydrocarbon accumulation efficiency.展开更多
With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that consid...With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted.展开更多
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th...With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.展开更多
Hepatocellular carcinoma(HCC)is a leading cause of death worldwide.Current therapies are effective for HCC patients with early disease,but many patients suffer recurrence after surgery and have a poor response to chem...Hepatocellular carcinoma(HCC)is a leading cause of death worldwide.Current therapies are effective for HCC patients with early disease,but many patients suffer recurrence after surgery and have a poor response to chemotherapy.Therefore,new therapeutic targets are needed.We analyzed gene expression profiles between HCC tissues and normal adjacent tissues from public databases and found that the expression of genes involved in lipid metabolism was significantly different.The analysis showed that AKR1C3 was upregulated in tumors,and high AKR1C3 expression was associated with a poorer prognosis in HCC patients.In vitro,assays demonstrated that the knockdown of AKR1C3 or the addition of the AKR1C3 inhibitor indomethacin suppressed the growth and colony formation of HCC cell lines.Knockdown of AKR1C3 in Huh7 cells reduced tumor growth in vivo.To explore the mechanism,we performed pathway enrichment analysis,and the results linked the expression of AKR1C3 with prostaglandin F2 alpha(PGF2a)downstream target genes.Suppression of AKR1C3 activity reduced the production of PGF2a,and supplementation with PGF2a restored the growth of indomethacin-treated Huh7 cells.Knockdown of the PGF receptor(PTGFR)and treatment with a PTGFR inhibitor significantly reduced HCC growth.We showed that indomethacin potentiated the sensitivity of Huh7 cells to sorafenib.In summary,our results indicate that AKR1C3 upregulation may promote HCC growth by promoting the production of PGF2α,and suppression of PTGFR limited HCC growth.Therefore,targeting the AKR1C3-PGF2a-PTGFR axis may be a new strategy for the treatment of HCC.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
Bladder cancer is a urological tumor with high rates of recurrence despite recent advances in novel therapies.Many proteins involved in the molecular mechanisms are currently an enigma,especially the transmembrane 9 s...Bladder cancer is a urological tumor with high rates of recurrence despite recent advances in novel therapies.Many proteins involved in the molecular mechanisms are currently an enigma,especially the transmembrane 9 superfamily member 1 which has an unclear function.Wei et al published the function and mechanism of this protein,and showed that it could participate in the proliferation,migration and invasion of tumor cells in bladder cancer,therefore treatments directed against this protein may be beneficial in avoiding this condition.展开更多
BACKGROUND MicroRNAs(miRNAs)regulate gene expression and play a critical role in cancer physiology.However,there is still a limited understanding of the function and regulatory mechanism of miRNAs in gastric cancer(GC...BACKGROUND MicroRNAs(miRNAs)regulate gene expression and play a critical role in cancer physiology.However,there is still a limited understanding of the function and regulatory mechanism of miRNAs in gastric cancer(GC).AIM To investigate the role and molecular mechanism of miRNA-145-5p(miR145-5p)in the progression of GC.METHODS Real-time polymerase chain reaction(RT-PCR)was used to detect miRNA expression in human GC tissues and cells.The ability of cancer cells to migrate and invade was assessed using wound-healing and transwell assays,respectively.Cell proliferation was measured using cell counting kit-8 and colony formation assays,and apoptosis was evaluated using flow cytometry.Expression of the epithelial-mesenchymal transition(EMT)-associated protein was determined by Western blot.Targets of miR-145-5p were predicated using bioinformatics analysis and verified using a dual-luciferase reporter system.Serpin family E member 1(SERPINE1)expression in GC tissues and cells was evaluated using RT-PCR and immunohistochemical staining.The correlation between SERPINE1 expression and overall patient survival was determined using Kaplan-Meier plot analysis.The association between SERPINE1 and GC progression was also tested.A rescue experiment of SERPINE1 overexpression was conducted to verify the relationship between this protein and miR-145-5p.The mechanism by which miR-145-5p influences GC progression was further explored by assessing tumor formation in nude mice.RESULTS GC tissues and cells had reduced miR-145-5p expression and SERPINE1 was identified as a direct target of this miRNA.Overexpression of miR-145-5p was associated with decreased GC cell proliferation,invasion,migration,and EMT,and these effects were reversed by forcing SERPINE1 expression.Kaplan-Meier plot analysis revealed that patients with higher SERPINE1 expression had a shorter survival rate than those with lower SERPINE1 expression.Nude mouse tumorigenesis experiments confirmed that miR-145-5p targets SERPINE1 to regulate extracellular signal-regulated kinase-1/2(ERK1/2).CONCLUSION This study found that miR-145-5p inhibits tumor progression and is expressed in lower amounts in patients with GC.MiR-145-5p was found to affect GC cell proliferation,migration,and invasion by negatively regulating SERPINE1 levels and controlling the ERK1/2 pathway.展开更多
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ...Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.展开更多
文摘BACKGROUND Hospice care plays an important role in improving the quality of life of advanced cancer patients,but controversy remains over whether age affects the attitudes of family members toward hospice care.AIM To investigate the attitudes of family members of advanced cancer patients of different ages toward hospice care.METHODS The study participants were 175 family members of patients with advanced cancer from January 2020 and October 2022.The participants were divided into youth(<40 years,n=65),middle-aged(40–60 years,n=59),and elderly(>60 years,n=51)groups.Researchers investigated and compared the degree of awareness regarding hospice care,attitudes,and whether the family members of patients would choose hospice care.RESULTS Among the family members of 175 patients,approximately 28%(49/175)were aware of hospice care.Awareness of hospice care,the proportion of hospice care acceptance and adaptation attitudes,and the proportion of those who chose hospice care in the youth group were higher in the middle-aged and elderly groups(P<0.05).No statistically significant difference was found in these three indicators between the middle-aged and elderly groups(P>0.05).Hospice care was chosen mainly to relieve pain and reduce unnecessary treatment,whereas the reasons for not choosing hospice care were mainly distrust and ethical concerns.CONCLUSION The family members of patients with advanced cancer had relatively low awareness of hospice care,while youth had a higher awareness of hospice care,acceptance,and adaptation attitudes,and were more willing to choose hospice care.
文摘Objective: To investigate the associated collateral stigma of the family members of schizophrenia patients and analyze its current status and influencing factors. Methods: The Link Depreciation-Discrimination Perception Scale was used to investigate the status quo of the associated stigma of the family members of 169 schizophrenia patients diagnosed in 4 hospitals in a certain province. The results of the investigation were analyzed and summarized. Results: The detection rate of stigma associated with the family members of schizophrenia patients was 72.78%, with a score of 28.41 ± 3.92 points. The main influencing factors were the family member’s education level, the patient’s illness duration, the family member’s occupation, and the family-patient relationship. Conclusion: The detection rate of stigma associated with schizophrenia was relatively high. This requires increased attention and appropriate nursing intervention.
基金supported by the National Natural Science Foundation of China(Grant No.51879124)。
文摘Tubular members subject to combined pitting corrosion and crack damage were numerically studied to clarify the reduction of ultimate strength and failure behavior,based on numerical models validated against available experi-ments.The effects of length,location and inclined angle of a crack under combined damage were studied to disclose the mechanism of interaction between the crack and corrosion pits.The methods,named as linear superposition directly accumulating the effects of solo crack and solo pitting damage,as well as crack projection transferring an inclined crack to a transverse one,were discussed and verified in the view of assessing ultimate strength of tubular members with combined damage.It was shown that the former is practical but complex while the next always over-estimates the residual strength.Besides,the location and inclined angle of a crack have a subtle effect on the reduction of ultimate strength under combined damage,especially at higher level of pitting damage,due to the synergistic effect between corrosion pits and cracks.Such effect can lead to early occurrence of plasticity and local buckling by inducing stress interaction between crack tips and pits,and causing more significant strength reduction compared with a solo type of damage.A practical method was proposed to determine the loss ratio of cross-sectional area on the equivalent weakest section of a damaged member.Based on the loss ratio,a formula was presented to predict the ultimate strength of damaged members with combined damage,showing good applicability.
基金Supported by the National Natural Science Foundation of China(42202176)CNPC-Southwest University of Petroleum Innovation Consortium Cooperation Project(2020CX050103).
文摘To clarify the formation and distribution of feldspar dissolution pores and predict the distribution of high-quality reservoir in gravity flow sandstone of the 7^(th) member of Triassic Yanchang Formation(Chang 7 Member)in the Ordos Basin,thin sections,scanning electron microscopy,energy spectrum analysis,X-ray diffraction whole rock analysis,and dissolution experiments are employed in this study to investigate the characteristics and control factors of feldspar dissolution pores.The results show that:(1)Three types of diagenetic processes are observed in the feldspar of Chang 7 sandstone in the study area:secondary overgrowth of feldspar,replacement by clay and calcite,and dissolution of detrital feldspar.(2)The feldspar dissolution of Chang 7 tight sandstone is caused by organic acid,and is further affected by the type of feldspar,the degree of early feldspar alteration,and the buffering effect of mica debris on organic acid.(3)Feldspars have varying degrees of dissolution.Potassium feldspar is more susceptible to dissolution than plagioclase.Among potassium feldspar,orthoclase is more soluble than microcline,and unaltered feldspar is more soluble than early kaolinized or sericitized feldspar.(4)The dissolution experiment demonstrated that the presence of mica can hinder the dissolution of feldspar.Mica of the same mass has a significantly stronger capacity to consume organic acids than feldspar.(5)Dissolution pores in feldspar of Chang 7 Member are more abundant in areas with low mica content,and they improve the reservoir physical properties,while in areas with high mica content,the number of feldspar dissolution pores decreases significantly.
基金Supported by 2020 Guangxi Zhuang Autonomous Region Health Care Commission Self-Financing Research Projects,No.Z202000962023 Guangxi University Young and Middle-Aged Teachers’Basic Research Ability Improvement Project,No.2023KY0091+1 种基金National Natural Science Foundation of China,No.82260241the Natural Science Foundation of Guangxi Province,No.2015GXNSFAA139171 and No.2020GXNSFAA259053.
文摘BACKGROUND Alzheimer’s disease(AD)is a neurodegenerative condition characterized by oxidative stress and neuroinflammation.Tanshinone ⅡA(Tan-ⅡA),a bioactive compound isolated from Salvia miltiorrhiza plants,has shown potential neuroprotective effects;however,the mechanisms underlying such a function remain unclear.AIM To investigate potential Tan-ⅡA neuroprotective effects in AD and to elucidate their underlying mechanisms.METHODS Hematoxylin and eosin staining was utilized to analyze structural brain tissue morphology.To assess changes in oxidative stress and neuroinflammation,we performed enzyme-linked immunosorbent assay and western blotting.Additionally,the effect of Tan-ⅡA on AD cell models was evaluated in vitro using the 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide assay.Genetic changes related to the long non-coding RNA(lncRNA)nuclear-enriched abundant transcript 1(NEAT1)/microRNA(miRNA,miR)-291a-3p/member RAS oncogene family Rab22a axis were assessed through reverse transcription quantitative polymerase chain reaction.RESULTS In vivo,Tan-ⅡA treatment improved neuronal morphology and attenuated oxidative stress and neuroinflammation in the brain tissue of AD mice.In vitro experiments showed that Tan-ⅡA dose-dependently ameliorated the amyloid-beta 1-42-induced reduction of neural stem cell viability,apoptosis,oxidative stress,and neuroinflammation.In this process,the lncRNA NEAT1-a potential therapeutic target-is highly expressed in AD mice and downregulated via Tan-ⅡA treatment.Mechanistically,NEAT1 promotes the transcription and translation of Rab22a via miR-291a-3p,which activates nuclear factor kappa-B(NF-κB)signaling,leading to activation of the pro-apoptotic B-cell lymphoma 2-associated X protein and inhibition of the anti-apoptotic B-cell lymphoma 2 protein,which exacerbates AD.Tan-ⅡA intervention effectively blocked this process by inhibiting the NEAT1/miR-291a-3p/Rab22a axis and NF-κB signaling.CONCLUSION This study demonstrates that Tan-ⅡA exerts neuroprotective effects in AD by modulating the NEAT1/miR-291a-3p/Rab22a/NF-κB signaling pathway,serving as a foundation for the development of innovative approaches for AD therapy.
基金This project is partly funded by Science and Technology Project of State Grid Zhejiang Electric Power Co.,Ltd.“Research on active Security Defense Strategies for Distribution Internet of Things Based on Trustworthy,under Grant No.5211DS22000G”.
文摘The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.
基金supported in part by the Chongqing Electronics Engineering Technology Research Center for Interactive Learningin part by the Chongqing key discipline of electronic informationin part by the Science and Technology Research Program of Chongqing Municipal Education Commission(KJQN202201630)。
文摘Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
基金This work is supported by the 2022 National Key Research and Development Plan“Security Protection Technology for Critical Information Infrastructure of Distribution Network”(2022YFB3105100).
文摘First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy.
基金Qinglan Project of Jiangsu Province of China,Grant/Award Number:BK20180820National Natural Science Foundation of China,Grant/Award Numbers:12271255,61701243,71771125,72271126,12227808+2 种基金Major Projects of Natural Sciences of University in Jiangsu Province of China,Grant/Award Numbers:21KJA630001,22KJA630001Postgraduate Research and Practice Innovation Program of Jiangsu Province,Grant/Award Number:KYCX23_2343supported by the National Natural Science Foundation of China(no.72271126,12271255,61701243,71771125,12227808)。
文摘As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have proper trust in medical machines.Intelligent machines that have applied machine learning(ML)technologies continue to penetrate deeper into the medical environment,which also places higher demands on intelligent healthcare.In order to make machines play a role in HMI in healthcare more effectively and make human‐machine cooperation more harmonious,the authors need to build good humanmachine trust(HMT)in healthcare.This article provides a systematic overview of the prominent research on ML and HMT in healthcare.In addition,this study explores and analyses ML and three important factors that influence HMT in healthcare,and then proposes a HMT model in healthcare.Finally,general trends are summarised and issues to consider addressing in future research on HMT in healthcare are identified.
基金jointly funded by projects supported by the National Natural Science Foundation of China(Grant No.41872150)the Joint Funds of the National Natural Science Foundation of China(Grant No.U19B6003)Major Scientific and Technological Projects of CNPC during the 13th five-year plan(No.2019A-02-10)。
文摘Recent advances in hydrocarbon exploration have been made in the Member Deng-2 marginal microbial mound-bank complex reservoirs of the Dengying Formation in the western Sichuan Basin, SW China,where the depositional process is regarded confusing. The microfacies, construction types, and depositional model of the Member Deng-2 marginal microbial mound-bank complex have been investigated using unmanned aerial vehicle photography, outcrop section investigation, thin section identification,and seismic reflections in the southwestern Sichuan Basin. The microbialite lithologic textures in this region include thrombolite, dendrolite, stromatolite, fenestral stromatolite, spongiostromata stone,oncolite, aggregated grainstone, and botryoidal grapestone. Based on the comprehensive analysis of“depositional fabrics-lithology-microfacies”, an association between a fore mound, mound framework,and back mound subfacies has been proposed based on water depth, current direction, energy level and lithologic assemblages. The microfacies of the mound base, mound core, mound flank, mound cap, and mound flat could be recognized among the mound framework subfacies. Two construction types of marginal microbial mound-bank complex have been determined based on deposition location, mound scale, migration direction, and sedimentary facies association. Type Jinkouhe microbial mound constructions(TJMMCs) develop along the windward margin owing to their proximity to the seaward subfacies fore mound, with a northeastwardly migrated microbial mound on top of the mud mound,exhibiting the characteristics of large-sized mounds and small-sized banks in the surrounding area. Type E'bian microbial mound constructions(TEMMCs) primarily occur on the leeward margin, resulting from the presence of onshore back mound subfacies, with the smaller southwestward migrated microbial mounds existing on a thicker microbial flat. The platform margin microbial mound depositional model can be correlated with certain lateral comparison profile and seismic reflection structures in the 2D seismic section, which can provide references for future worldwide exploration. Microbial mounds with larger buildups and thicker vertical reservoirs are typically targeted on the windward margin, while small-sized microbial mounds and flats with better lateral connections are typically focused on the leeward margin.
基金This work was supported by the Ministry of Education and China Mobile Research Fund Project(MCM20200102)the 173 Project(No.2019-JCJQ-ZD-342-00)+2 种基金the National Natural Science Foundation of China(No.U19A2081)the Fundamental Research Funds for the Central Universities(No.2023SCU12129)the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129).
文摘Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss.
基金Supported by the Enterprise Innovation and Development Joint Fund of National Natural Science Foundation of China(U19B6003)National Natural Science Foundation of China(41872150)。
文摘The types,occurrence and composition of authigenic clay minerals in argillaceous limestone of sepiolite-bearing strata of the first member of the Middle Permian Maokou Formation(Mao-1 Member)in eastern Sichuan Basin were investigated through outcrop section measurement,core observation,thin section identification,argon ion polishing,X-ray diffraction,scanning electron microscope,energy spectrum analysis and laser ablation-inductively coupled plasma-mass spectrometry.The diagenetic evolution sequence of clay minerals was clarified,and the sedimentary-diagenetic evolution model of clay minerals was established.The results show that authigenic sepiolite minerals were precipitated in the Si4+and Mg2+-rich cool aragonite sea and sepiolite-bearing strata were formed in the Mao-1 Member.During burial diagenesis,authigenic clay minerals undergo two possible evolution sequences.First,from the early diagenetic stage A to the middle diagenetic stage A1,the sepiolite kept stable in the shallow-buried environment lack of Al3+.It began to transform into stevensite in the middle diagenetic stage A2,and then evolved into disordered talc in the middle diagenetic stage B1and finally into talc in the period from the middle diagenetic stage B2to the late diagenetic stage.Thus,the primary diagenetic evolution sequence of authigenic clay minerals,i.e.sepiolite-stevensite-disordered talc-talc,was formed in the Mao-1 Member.Second,in the early diagenetic stage A,as Al3+carried by the storm and upwelling currents was involved in the diagenetic process,trace of sepiolite started to evolve into smectite,and a part of smectite turned into chlorite.From the early diagenetic stage B to the middle diagenesis stage A1,a part of smectite evolved to illite/smectite mixed layer(I/S).The I/S evolved initially into illite from the middle diagenesis stage A2to the middle diagenesis stage B2,and then totally into illite in the late diagenesis stage.Thus,the secondary diagenetic evolution sequence of authigenic clay minerals,i.e.sepiolite-smectite-chlorite/illite,was formed in the Mao-1 Member.The types and evolution of authigenic clay minerals in argillaceous limestone of sepiolite-bearing strata are significant for petroleum geology in two aspects.First,sepiolite can adsorb and accumulate a large amount of organic matters,thereby effectively improving the quality and hydrocarbon generation potential of the source rocks of the Mao-1 Member.Second,the evolution from sepiolite to talc is accompanied by the formation of numerous organic matter pores and clay shrinkage pores/fractures,as well as the releasing of the Mg2+-rich diagenetic fluid,which allows for the dolomitization of limestone within or around the sag.As a result,the new assemblages of self-generation and self-accumulation,and lower/side source and upper/lateral reservoir,are created in the Middle Permian,enhancing the hydrocarbon accumulation efficiency.
基金The work was supported by Humanities and Social Sciences Fund of the Ministry of Education(No.22YJA630119)the National Natural Science Foundation of China(No.71971051)Natural Science Foundation of Hebei Province(No.G2021501004).
文摘With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted.
文摘With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.
基金National Yang Ming Chiao Tung University Far Eastern Memorial Hospital Joint Research Programs(NYCU-FEMH 109DN03,110DN06,111DN04,112DN05).
文摘Hepatocellular carcinoma(HCC)is a leading cause of death worldwide.Current therapies are effective for HCC patients with early disease,but many patients suffer recurrence after surgery and have a poor response to chemotherapy.Therefore,new therapeutic targets are needed.We analyzed gene expression profiles between HCC tissues and normal adjacent tissues from public databases and found that the expression of genes involved in lipid metabolism was significantly different.The analysis showed that AKR1C3 was upregulated in tumors,and high AKR1C3 expression was associated with a poorer prognosis in HCC patients.In vitro,assays demonstrated that the knockdown of AKR1C3 or the addition of the AKR1C3 inhibitor indomethacin suppressed the growth and colony formation of HCC cell lines.Knockdown of AKR1C3 in Huh7 cells reduced tumor growth in vivo.To explore the mechanism,we performed pathway enrichment analysis,and the results linked the expression of AKR1C3 with prostaglandin F2 alpha(PGF2a)downstream target genes.Suppression of AKR1C3 activity reduced the production of PGF2a,and supplementation with PGF2a restored the growth of indomethacin-treated Huh7 cells.Knockdown of the PGF receptor(PTGFR)and treatment with a PTGFR inhibitor significantly reduced HCC growth.We showed that indomethacin potentiated the sensitivity of Huh7 cells to sorafenib.In summary,our results indicate that AKR1C3 upregulation may promote HCC growth by promoting the production of PGF2α,and suppression of PTGFR limited HCC growth.Therefore,targeting the AKR1C3-PGF2a-PTGFR axis may be a new strategy for the treatment of HCC.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘Bladder cancer is a urological tumor with high rates of recurrence despite recent advances in novel therapies.Many proteins involved in the molecular mechanisms are currently an enigma,especially the transmembrane 9 superfamily member 1 which has an unclear function.Wei et al published the function and mechanism of this protein,and showed that it could participate in the proliferation,migration and invasion of tumor cells in bladder cancer,therefore treatments directed against this protein may be beneficial in avoiding this condition.
文摘BACKGROUND MicroRNAs(miRNAs)regulate gene expression and play a critical role in cancer physiology.However,there is still a limited understanding of the function and regulatory mechanism of miRNAs in gastric cancer(GC).AIM To investigate the role and molecular mechanism of miRNA-145-5p(miR145-5p)in the progression of GC.METHODS Real-time polymerase chain reaction(RT-PCR)was used to detect miRNA expression in human GC tissues and cells.The ability of cancer cells to migrate and invade was assessed using wound-healing and transwell assays,respectively.Cell proliferation was measured using cell counting kit-8 and colony formation assays,and apoptosis was evaluated using flow cytometry.Expression of the epithelial-mesenchymal transition(EMT)-associated protein was determined by Western blot.Targets of miR-145-5p were predicated using bioinformatics analysis and verified using a dual-luciferase reporter system.Serpin family E member 1(SERPINE1)expression in GC tissues and cells was evaluated using RT-PCR and immunohistochemical staining.The correlation between SERPINE1 expression and overall patient survival was determined using Kaplan-Meier plot analysis.The association between SERPINE1 and GC progression was also tested.A rescue experiment of SERPINE1 overexpression was conducted to verify the relationship between this protein and miR-145-5p.The mechanism by which miR-145-5p influences GC progression was further explored by assessing tumor formation in nude mice.RESULTS GC tissues and cells had reduced miR-145-5p expression and SERPINE1 was identified as a direct target of this miRNA.Overexpression of miR-145-5p was associated with decreased GC cell proliferation,invasion,migration,and EMT,and these effects were reversed by forcing SERPINE1 expression.Kaplan-Meier plot analysis revealed that patients with higher SERPINE1 expression had a shorter survival rate than those with lower SERPINE1 expression.Nude mouse tumorigenesis experiments confirmed that miR-145-5p targets SERPINE1 to regulate extracellular signal-regulated kinase-1/2(ERK1/2).CONCLUSION This study found that miR-145-5p inhibits tumor progression and is expressed in lower amounts in patients with GC.MiR-145-5p was found to affect GC cell proliferation,migration,and invasion by negatively regulating SERPINE1 levels and controlling the ERK1/2 pathway.
文摘Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.