Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women part...Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women participated between 14:00 and 15:00, taking the circadian rhythm of salivary secretion into account. The types and concentrations of the taste solutions were glutamic acid (1.7 × 10<sup>−3</sup> M), inosinic acid (9.8 × 10<sup>−3</sup> M), and guanylic acid (9.8 × 10<sup>−3</sup> M) for umami stimulation, citric acid (6.5 × 10<sup>−3</sup> M) for acidity stimulation, and sucrose (1.6 × 10<sup>−2</sup> M) for sweetness stimulation. First, the unstimulated salivary flow rate was measured. Then, 3 ml of a flavor solution was dropped under the tongue using a syringe. The saliva was expelled into an aluminum cup every minute and weighed. The first minute’s value minus 3 ml flavor solution was the stimulated salivary secretion rate produced by each flavor. The time-to-return to the initial unstimulated salivary flow rate was the duration of the stimulated saliva secretion rate. Results: The mean unstimulated salivary flow rate across participants was 0.64 ± 0.25 ml/min (range: 0.23 - 1.03 ml/min). The highest amount of saliva was induced by citric acid. There were significant differences between citric acid and the other flavor solutions (p < 0.05 for glutamic acid, inosinic acid, and sucrose;p < 0.01 for guanylic acid). There were no significant differences in duration of salivation between the flavor solutions. When the participants were divided into slow (0.45 ± 0.16 ml/min) and fast groups (0.83 ± 0.15 ml/min) based on their median resting salivary secretion rate, there were no significant differences between the two groups in the amount of saliva secreted at 1 minute after stimulation and the duration of the salivary secretion rate. Conclusion: Umami stimulation was effective in slowing salivary secretion and sustaining salivary secretion after stimulation.展开更多
Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan...Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan is the main type of polysaccharide from natural mushroom,which has potential medicinal prospects.Nevertheless,the antidiabetic property of mannogalactoglucan in T1DM has not been fully elucidated.In this study,we obtained the neutral fraction of alkali-soluble Armillaria mellea polysaccharide(AAMP-N) with the structure of mannogalactoglucan from the fruiting body of A.mellea and investigated the potential therapeutic value of AAMP-N in T1DM.We demonstrated that AAMP-N lowered blood glucose and improved diabetes symptoms in T1DM mice.AAMP-N activated unfolded protein response(UPR) signaling pathway to maintain ER protein folding homeostasis and promote insulin secretion in vivo.Besides that,AAMP-N promoted insulin synthesis via upregulating the expression of transcription factors,increased Ca^(2+) signals to stimulate intracellular insulin secretory vesicle transport via activating calcium/calmodulin-dependent kinase Ⅱ(CamkⅡ) and cAMP/PKA signals,and enhanced insulin secretory vesicle fusion with the plasma membrane via vesicle-associated membrane protein 2(VAMP2).Collectively,these studies demonstrated that the therapeutic potential of AAMP-N on pancreatic islets function,indicating that mannogalactoglucan could be natural nutraceutical used for the treatment of T1DM.展开更多
Background: We aimed to evaluate the short-term metabolic effects of a GLP-1a, (liraglutide) versus a DPP-4i, (vildagliptin) in a group of sub-Saharan type 2 diabetes patients. Methods: We conducted a randomized contr...Background: We aimed to evaluate the short-term metabolic effects of a GLP-1a, (liraglutide) versus a DPP-4i, (vildagliptin) in a group of sub-Saharan type 2 diabetes patients. Methods: We conducted a randomized controlled single blinded clinical trial in 14 uncontrolled type 2 diabetes patients (HbA1c ≥ 53 mmol/mol) with mean duration of diabetes of 8 [1 - 12] years and median age of 57 [49 - 61] years. Baseline treatment consisted of metformin in monotherapy or metformin plus sulfonylureas. Participants were randomly allocated to 2 groups of add-on 1.2 mg/day subcutaneous liraglutide in group 1 or 100 mg/day of oral vildagliptin in group 2 for 2 weeks. In all participants, insulin secretion in response to mixed meal tolerance test, insulin sensitivity by 80 mU/m<sup>2</sup>/min hyperinsulinemic-euglycemic clamp, body composition, and lipid profile were measured before and after intervention. Results: At the end of intervention, insulin sensitivity remained unchanged both with liraglutide from 6.6 [4.2 - 7.9] to 6.9 [4.3 - 10.8] mg/kg/min;p = 0.61 and vildagliptin from 7.1 [5.3 - 9.0] to 6.5 [5.6 - 9.4] mg/kg/min (p = 0.86). The area under the C-peptide curve varied from 5.5 [1.0 - 10.9] to 14.9 [10.8 - 17.2] nmol/L/120min, p = 0.09 in group 1 and from 1.1 [0.5 - 14.1] to 13.0 [9.6 - 16.9] nmol/L/120min (p = 0.17) in group 2. LDL Cholesterol levels decreased significantly with liraglutide from 0.85 g/L [0.51 - 1.02] to 0.54 g/L [0.50 - 0.73] (p = 0.04) but not with Vildagliptin. Body weight tended to decrease in group 1 (−0.6 kg) versus modest increase in group 2 (+1.1 kg). Conclusion: Short-term metabolic effects of Liraglutide and Vildagliptin add-on therapy are comparable in sub-Saharan type 2 diabetes patients with a more favorable trend for Liraglutide on body weight, lipid profile, and insulin secretion.展开更多
βcells are the main cells responsible for the hypoglycemic function of pancreatic islets,and the insulin secreted by these cells is the only hormone that lowers blood glucose levels in the human body.βcells are regu...βcells are the main cells responsible for the hypoglycemic function of pancreatic islets,and the insulin secreted by these cells is the only hormone that lowers blood glucose levels in the human body.βcells are regulated by various factors,among which neurotransmitters make an important contribution.This paper discusses the effects of neurotransmitters secreted by various sympathetic and parasympathetic nerves onβcells and summarizes the mechanisms by which various neurotransmitters regulate insulin secretion.Many neurotransmitters do not have a single source and are not only released from nerve terminals but also synthesized byβcells themselves,allowing them to synergistically regulate insulin secretion.Almost all of these neurotransmitters depend on the presence of glucose to function,and their actions are mostly related to the Ca^(2+)and cAMP concentrations.Although neurotransmitters have been extensively studied,many of their mechanisms remain unclear and require further exploration by researchers.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
Based on the practice of oil and gas exploration in the Huizhou Sag of the Pearl River Mouth Basin,the geochemical indexes of source rocks were measured,the reservoir development morphology was restored,the rocks and ...Based on the practice of oil and gas exploration in the Huizhou Sag of the Pearl River Mouth Basin,the geochemical indexes of source rocks were measured,the reservoir development morphology was restored,the rocks and minerals were characterized microscopically,the measured trap sealing indexes were compared,the biomarker compounds of crude oil were extracted,the genesis of condensate gas was identified,and the reservoir-forming conditions were examined.On this basis,the Paleogene Enping Formation in the Huizhou 26 subsag was systematically analyzed for the potential of oil and gas resources,the development characteristics of large-scale high-quality conglomerate reservoirs,the trapping effectiveness of faults,the hydrocarbon migration and accumulation model,and the formation conditions and exploration targets of large-and medium-sized glutenite-rich oil and gas fields.The research results were obtained in four aspects.First,the Paleogene Wenchang Formation in the Huizhou 26 subsag develops extensive and thick high-quality source rocks of semi-deep to deep lacustrine subfacies,which have typical hydrocarbon expulsion characteristics of"great oil generation in the early stage and huge gas expulsion in the late stage",providing a sufficient material basis for hydrocarbon accumulation in the Enping Formation.Second,under the joint control of the steep slope zone and transition zone of the fault within the sag,the large-scale near-source glutenite reservoirs are highly heterogeneous,with the development scale dominated hierarchically by three factors(favorable facies zone,particle component,and microfracture).The(subaqueous)distributary channels near the fault system,with equal grains,a low mud content(<5%),and a high content of feldspar composition,are conducive to the development of sweet spot reservoirs.Third,the strike-slip pressurization trap covered by stable lake flooding mudstone is a necessary condition for oil and gas preservation,and the NE and nearly EW faults obliquely to the principal stress have the best control on traps.Fourth,the spatiotemporal configuration of high-quality source rocks,fault transport/sealing,and glutenite reservoirs controls the degree of hydrocarbon enrichment.From top to bottom,three hydrocarbon accumulation units,i.e.low-fill zone,transition zone,and high-fill zone,are recognized.The main area of the channel in the nearly pressurized source-connecting fault zone is favorable for large-scale hydrocarbon enrichment.The research results suggest a new direction for the exploration of large-scale glutenite-rich reservoirs in the Enping Formation of the Pearl River Mouth Basin,and present a major breakthrough in oil and gas exploration.展开更多
BACKGROUND Impaired glucose tolerance(IGT)is a homeostatic state between euglycemia and hyperglycemia and is considered an early high-risk state of diabetes.When IGT occurs,insulin sensitivity decreases,causing a redu...BACKGROUND Impaired glucose tolerance(IGT)is a homeostatic state between euglycemia and hyperglycemia and is considered an early high-risk state of diabetes.When IGT occurs,insulin sensitivity decreases,causing a reduction in insulin secretion and an increase in glucagon secretion.Recently,vascular endothelial growth factor B(VEGFB)has been demonstrated to play a positive role in improving glucose metabolism and insulin sensitivity.Therefore,we constructed a mouse model of IGT through high-fat diet feeding and speculated that VEGFB can regulate hyperglycemia in IGT by influencing insulin-mediated glucagon secretion,thus contributing to the prevention and cure of prediabetes.AIM To explore the potential molecular mechanism and regulatory effects of VEGFB on insulin-mediated glucagon in mice with IGT.METHODS We conducted in vivo experiments through systematic VEGFB knockout and pancreatic-specific VEGFB overexpression.Insulin and glucagon secretions were detected via enzyme-linked immunosorbent assay,and the protein expression of phosphoinositide 3-kinase(PI3K)/protein kinase B(AKT)was determined using western blot.Further,mRNA expression of forkhead box protein O1,phosphoenolpyruvate carboxykinase,and glucose-6 phosphatase was detected via quantitative polymerase chain reaction,and the correlation between the expression of proteins was analyzed via bioinformatics.RESULTS In mice with IGT and VEGFB knockout,glucagon secretion increased,and the protein expression of PI3K/AKT decreased dramatically.Further,in mice with VEGFB overexpression,glucagon levels declined,with the activation of the PI3K/AKT signaling pathway.CONCLUSION VEGFB/vascular endothelial growth factor receptor 1 can promote insulin-mediated glucagon secretion by activating the PI3K/AKT signaling pathway to regulate glucose metabolism disorders in mice with IGT.展开更多
BACKGROUND Holoprosencephaly(HPE)is a congenital malformation with various degrees of incomplete separation of the cerebral hemispheres due to differentiation disorders of the forebrain.Although HPE with diabetes insi...BACKGROUND Holoprosencephaly(HPE)is a congenital malformation with various degrees of incomplete separation of the cerebral hemispheres due to differentiation disorders of the forebrain.Although HPE with diabetes insipidus due to associated pituitary dysfunction has been reported,HPE with the syndrome of inappropriate antidiuretic hormone secretion(SIADH)is very rare.Tolvaptan,a vasopressin V2 receptor antagonist,is effective in adults with SIADH.However,there is no report of its efficacy in infants with SIADH.The purpose of this report is to demonstrate that tolvaptan is effective for SIADH in infants and that administration of tolvaptan eliminates the need for restriction of water intake and sodium administration.CASE SUMMARY A 2414-g female infant was born at 38 wk by normal vaginal delivery.Facial anomalies and head magnetic resonance imaging indicated semilobar HPE.After birth,she had hyponatremia due to SIADH and was treated using water and sodium restriction.However,she developed an exaggerated response to the fluid restrictions,resulting in large fluctuations in serum sodium levels.Subsequent administration of tolvaptan improved the fluctuations in serum sodium levels without the need for adjustment of water or sodium administration.Serum sodium was maintained within the normal range after discontinuation of tolvaptan at 80 d of life.There were no side effects,such as hypernatremia or liver dysfunction,during the administration of tolvaptan.CONCLUSION This is the first report on the safety and efficacy of tolvaptan in an infant with SIADH associated with HPE.展开更多
Objective: To study the application effect of mouth-opening training sticks combined with oral massage on patients with mouth-opening difficulty after treatment for head and neck cancer. Methods: Using convenient samp...Objective: To study the application effect of mouth-opening training sticks combined with oral massage on patients with mouth-opening difficulty after treatment for head and neck cancer. Methods: Using convenient sampling, 60 patients with mouth-opening difficulty after treatment for head and neck cancer admitted to the Oncology Department from February 2022 to October 2023 were selected for a 2-week exercise and nursing program. The patients were divided into a control group (February 1, 2022 to November 30, 2022) and an observation group (December 1, 2022 to October 31, 2023), with 30 patients in each group. The control group underwent routine mouth-opening functional exercises combined with cork for oral support training, while the observation group underwent routine mouth-opening functional exercises combined with oral massage and mouth-opening training sticks for oral support training. The mouth-opening degree, mouth-opening difficulty level, comfort level, compliance, and quality of life were observed in both groups. Results: Before the intervention, there were no statistically significant differences in mouth-opening degree and mouth-opening difficulty level between the two groups (P > 0.05). After the intervention, the mouth-opening degree, mouth-opening difficulty level, oral comfort level, compliance, and QLICP-HN scores in the observation group were all better than those in the control group, with statistically significant differences (P < 0.05). Conclusion: The combination of mouth-opening training sticks and oral massage with mouth-opening functional exercises can effectively improve the degree of mouth-opening difficulty, enhance oral comfort, increase compliance with mouth-opening exercises, and improve quality of life.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three...In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
The coupling relationship between shelf-edge deltas and deep-water fan sand bodies is a hot and cutting-edge field of international sedimentology and deep-water oil and gas exploration.Based on the newly acquired high...The coupling relationship between shelf-edge deltas and deep-water fan sand bodies is a hot and cutting-edge field of international sedimentology and deep-water oil and gas exploration.Based on the newly acquired high-resolution 3D seismic,logging and core data of Pearl River Mouth Basin(PRMB),this paper dissected the shelf-edge delta to deep-water fan(SEDDF)depositional system in the Oligocene Zhuhai Formation of Paleogene in south subsag of Baiyun Sag,and revealed the complex coupling relationship from the continental shelf edge to deep-water fan sedimentation and its genetic mechanisms.The results show that during the deposition of the fourth to first members of the Zhuhai Formation,the scale of the SEDDF depositional system in the study area showed a pattern of first increasing and then decreasing,with deep-water fan developed in the third to first members and the largest plane distribution scale developed in the late stage of the second member.Based on the development of SEDDF depositional system along the source direction,three types of coupling relationships are divided,namely,deltas that are linked downdip to fans,deltas that lack downdip fans and fans that lack updip coeval deltas,with different depositional characteristics and genetic mechanisms.(1)Deltas that are linked downdip to fans:with the development of shelf-edge deltas in the shelf area and deep-water fans in the downdip slope area,and the strong source supply and relative sea level decline are the two key factors which control the development of this type of source-to-sink(S2S).The development of channels on the continental shelf edge is conducive to the formation of this type of S2S system even with weak source supply and high sea level.(2)Deltas that lack downdip fans:with the development of shelf edge deltas in shelf area,while deep water fans are not developed in the downdip slope area.The lack of“sources”and“channels”,and fluid transformation are the three main reasons for the formation of this type of S2S system.(3)Fans that lack updip coeval deltas:with the development of deep-water fans in continental slope area and the absence of updip coeval shelf edge deltas,which is jointly controlled by the coupling of fluid transformation at the shelf edge and the“channels”in the continental slope area.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
Objective Microcystin-leucine-arginine(MC-LR)exposure induces lipid metabolism disorders in the liver.Secreted frizzled-related protein 5(SFRP5)is a natural antagonist of winglesstype MMTV integration site family,memb...Objective Microcystin-leucine-arginine(MC-LR)exposure induces lipid metabolism disorders in the liver.Secreted frizzled-related protein 5(SFRP5)is a natural antagonist of winglesstype MMTV integration site family,member 5A(Wnt5a)and an anti-inflammatory adipocytokine.In this study,we aimed to investigate whether MC-LR can induce lipid metabolism disorders in hepatocytes and whether SFRP5,which has anti-inflammatory effects,can alleviate the effects of hepatic lipid metabolism by inhibiting the Wnt5a/Jun N-terminal kinase(JNK)pathway.Methods We exposed mice to MC-LR in vivo to induce liver lipid metabolism disorders.Subsequently,mouse hepatocytes that overexpressed SFRP5 or did not express SFRP5 were exposed to MC-LR,and the effects of SFRP5 overexpression on inflammation and Wnt5a/JNK activation by MC-LR were observed.Results MC-LR exposure induced liver lipid metabolism disorders in mice and significantly decreased SFRP5 mRNA and protein levels in a concentration-dependent manner.SFRP5 overexpression in AML12cells suppressed MC-LR-induced inflammation.Overexpression of SFRP5 also inhibited Wnt5a and phosphorylation of JNK.Conclusion MC-LR can induce lipid metabolism disorders in mice,and SFRP5 can attenuate lipid metabolism disorders in the mouse liver by inhibiting Wnt5a/JNK signaling.展开更多
Based on high-resolution 3D seismic data acquired in the Pearl(Zhujiang)River Mouth Basin of the northern South China Sea,this study investigated the geometry,spatial extension,and throw distribution of the post-rift ...Based on high-resolution 3D seismic data acquired in the Pearl(Zhujiang)River Mouth Basin of the northern South China Sea,this study investigated the geometry,spatial extension,and throw distribution of the post-rift normal fault through detailed seismic interpretation and fault modeling.A total of 289 post-rift normal faults were identified in the study area and can be classified into four types:(1)isolated normal faults above the carbonate platform;(2)isolated normal faults cutting through the carbonate platform;(3)conjugate normal faults,and(4)connecting normal faults.Throw distribution analysis on the fault planes show that the vertical throw profiles of most normal fault exhibit flat-topped profiles.Isolated normal faults above the carbonate platform exhibit roughly concentric ellipses with maximum throw zones in the central section whereas the normal faults cutting through the carbonate platform miss the lowermost section due to the chaotic seismic reflections in the interior of the carbonate platform.The vertical throws of conjugate normal faults anomalously decrease toward their intersection region on the fault plane whereas the connecting normal faults present two maximum throw zones in the central section of the fault plane.According to the symmetric elliptical distribution model of fault throw,an estimation was made indicating that normal faults cutting through the carbonate platform extended downward between-1308 s and-1780 s(two-way travel time)in depth and may not penetrate the entire Liuhua carbonate platform.Moreover,it is observed that the distribution of karst caves on the top of the carbonate platform disaccord with those of hydrocarbon reservoirs and the post-rift normal faults cutting through the carbonate platform in the study area.We propose that these karst caves formed most probably by corrosive fluids derived from magmatic activities during the Dongsha event,rather than pore waters or hydrocarbons.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
文摘Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women participated between 14:00 and 15:00, taking the circadian rhythm of salivary secretion into account. The types and concentrations of the taste solutions were glutamic acid (1.7 × 10<sup>−3</sup> M), inosinic acid (9.8 × 10<sup>−3</sup> M), and guanylic acid (9.8 × 10<sup>−3</sup> M) for umami stimulation, citric acid (6.5 × 10<sup>−3</sup> M) for acidity stimulation, and sucrose (1.6 × 10<sup>−2</sup> M) for sweetness stimulation. First, the unstimulated salivary flow rate was measured. Then, 3 ml of a flavor solution was dropped under the tongue using a syringe. The saliva was expelled into an aluminum cup every minute and weighed. The first minute’s value minus 3 ml flavor solution was the stimulated salivary secretion rate produced by each flavor. The time-to-return to the initial unstimulated salivary flow rate was the duration of the stimulated saliva secretion rate. Results: The mean unstimulated salivary flow rate across participants was 0.64 ± 0.25 ml/min (range: 0.23 - 1.03 ml/min). The highest amount of saliva was induced by citric acid. There were significant differences between citric acid and the other flavor solutions (p < 0.05 for glutamic acid, inosinic acid, and sucrose;p < 0.01 for guanylic acid). There were no significant differences in duration of salivation between the flavor solutions. When the participants were divided into slow (0.45 ± 0.16 ml/min) and fast groups (0.83 ± 0.15 ml/min) based on their median resting salivary secretion rate, there were no significant differences between the two groups in the amount of saliva secreted at 1 minute after stimulation and the duration of the salivary secretion rate. Conclusion: Umami stimulation was effective in slowing salivary secretion and sustaining salivary secretion after stimulation.
基金funded by the National Natural Science Foundation of China (32371341,31872674)the Scientific and Technologic Foundation of Jilin Province (20230202050NC)the Fundamental Research Funds for the Central Universities (CGZH202206)。
文摘Type 1 diabetes mellitus(T1DM) lacks insulin secretion due to autoimmune deficiency of pancreaticβ-cells.Protecting pancreatic islets and enhancing insulin secretion has been therapeutic approaches.Mannogalactoglucan is the main type of polysaccharide from natural mushroom,which has potential medicinal prospects.Nevertheless,the antidiabetic property of mannogalactoglucan in T1DM has not been fully elucidated.In this study,we obtained the neutral fraction of alkali-soluble Armillaria mellea polysaccharide(AAMP-N) with the structure of mannogalactoglucan from the fruiting body of A.mellea and investigated the potential therapeutic value of AAMP-N in T1DM.We demonstrated that AAMP-N lowered blood glucose and improved diabetes symptoms in T1DM mice.AAMP-N activated unfolded protein response(UPR) signaling pathway to maintain ER protein folding homeostasis and promote insulin secretion in vivo.Besides that,AAMP-N promoted insulin synthesis via upregulating the expression of transcription factors,increased Ca^(2+) signals to stimulate intracellular insulin secretory vesicle transport via activating calcium/calmodulin-dependent kinase Ⅱ(CamkⅡ) and cAMP/PKA signals,and enhanced insulin secretory vesicle fusion with the plasma membrane via vesicle-associated membrane protein 2(VAMP2).Collectively,these studies demonstrated that the therapeutic potential of AAMP-N on pancreatic islets function,indicating that mannogalactoglucan could be natural nutraceutical used for the treatment of T1DM.
文摘Background: We aimed to evaluate the short-term metabolic effects of a GLP-1a, (liraglutide) versus a DPP-4i, (vildagliptin) in a group of sub-Saharan type 2 diabetes patients. Methods: We conducted a randomized controlled single blinded clinical trial in 14 uncontrolled type 2 diabetes patients (HbA1c ≥ 53 mmol/mol) with mean duration of diabetes of 8 [1 - 12] years and median age of 57 [49 - 61] years. Baseline treatment consisted of metformin in monotherapy or metformin plus sulfonylureas. Participants were randomly allocated to 2 groups of add-on 1.2 mg/day subcutaneous liraglutide in group 1 or 100 mg/day of oral vildagliptin in group 2 for 2 weeks. In all participants, insulin secretion in response to mixed meal tolerance test, insulin sensitivity by 80 mU/m<sup>2</sup>/min hyperinsulinemic-euglycemic clamp, body composition, and lipid profile were measured before and after intervention. Results: At the end of intervention, insulin sensitivity remained unchanged both with liraglutide from 6.6 [4.2 - 7.9] to 6.9 [4.3 - 10.8] mg/kg/min;p = 0.61 and vildagliptin from 7.1 [5.3 - 9.0] to 6.5 [5.6 - 9.4] mg/kg/min (p = 0.86). The area under the C-peptide curve varied from 5.5 [1.0 - 10.9] to 14.9 [10.8 - 17.2] nmol/L/120min, p = 0.09 in group 1 and from 1.1 [0.5 - 14.1] to 13.0 [9.6 - 16.9] nmol/L/120min (p = 0.17) in group 2. LDL Cholesterol levels decreased significantly with liraglutide from 0.85 g/L [0.51 - 1.02] to 0.54 g/L [0.50 - 0.73] (p = 0.04) but not with Vildagliptin. Body weight tended to decrease in group 1 (−0.6 kg) versus modest increase in group 2 (+1.1 kg). Conclusion: Short-term metabolic effects of Liraglutide and Vildagliptin add-on therapy are comparable in sub-Saharan type 2 diabetes patients with a more favorable trend for Liraglutide on body weight, lipid profile, and insulin secretion.
基金Supported by National Natural Science Foundation of China,No.81471081the Natural Science Foundation of Fujian Province,China,No.2019J01010+1 种基金Xiamen Research Foundation for Science and Technology Project No.3502Z20194037Scientific Research Foundation for Advanced Talents,Xiang’an Hospital of Xiamen University,No.PM201809170005.
文摘βcells are the main cells responsible for the hypoglycemic function of pancreatic islets,and the insulin secreted by these cells is the only hormone that lowers blood glucose levels in the human body.βcells are regulated by various factors,among which neurotransmitters make an important contribution.This paper discusses the effects of neurotransmitters secreted by various sympathetic and parasympathetic nerves onβcells and summarizes the mechanisms by which various neurotransmitters regulate insulin secretion.Many neurotransmitters do not have a single source and are not only released from nerve terminals but also synthesized byβcells themselves,allowing them to synergistically regulate insulin secretion.Almost all of these neurotransmitters depend on the presence of glucose to function,and their actions are mostly related to the Ca^(2+)and cAMP concentrations.Although neurotransmitters have been extensively studied,many of their mechanisms remain unclear and require further exploration by researchers.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金Supported by the CNOOC Major Technology Project During the 14th FIVE-YEAR PLAN PERIOD(KJGG2022-0403)CNOOC Major Technology Project(KJZH-2021-0003-00).
文摘Based on the practice of oil and gas exploration in the Huizhou Sag of the Pearl River Mouth Basin,the geochemical indexes of source rocks were measured,the reservoir development morphology was restored,the rocks and minerals were characterized microscopically,the measured trap sealing indexes were compared,the biomarker compounds of crude oil were extracted,the genesis of condensate gas was identified,and the reservoir-forming conditions were examined.On this basis,the Paleogene Enping Formation in the Huizhou 26 subsag was systematically analyzed for the potential of oil and gas resources,the development characteristics of large-scale high-quality conglomerate reservoirs,the trapping effectiveness of faults,the hydrocarbon migration and accumulation model,and the formation conditions and exploration targets of large-and medium-sized glutenite-rich oil and gas fields.The research results were obtained in four aspects.First,the Paleogene Wenchang Formation in the Huizhou 26 subsag develops extensive and thick high-quality source rocks of semi-deep to deep lacustrine subfacies,which have typical hydrocarbon expulsion characteristics of"great oil generation in the early stage and huge gas expulsion in the late stage",providing a sufficient material basis for hydrocarbon accumulation in the Enping Formation.Second,under the joint control of the steep slope zone and transition zone of the fault within the sag,the large-scale near-source glutenite reservoirs are highly heterogeneous,with the development scale dominated hierarchically by three factors(favorable facies zone,particle component,and microfracture).The(subaqueous)distributary channels near the fault system,with equal grains,a low mud content(<5%),and a high content of feldspar composition,are conducive to the development of sweet spot reservoirs.Third,the strike-slip pressurization trap covered by stable lake flooding mudstone is a necessary condition for oil and gas preservation,and the NE and nearly EW faults obliquely to the principal stress have the best control on traps.Fourth,the spatiotemporal configuration of high-quality source rocks,fault transport/sealing,and glutenite reservoirs controls the degree of hydrocarbon enrichment.From top to bottom,three hydrocarbon accumulation units,i.e.low-fill zone,transition zone,and high-fill zone,are recognized.The main area of the channel in the nearly pressurized source-connecting fault zone is favorable for large-scale hydrocarbon enrichment.The research results suggest a new direction for the exploration of large-scale glutenite-rich reservoirs in the Enping Formation of the Pearl River Mouth Basin,and present a major breakthrough in oil and gas exploration.
基金Supported by the National Natural Science Foundation of China,No.31771284Basic Research Project of Yantai Science and Technology Innovation and Development Plan,No.2022JCYJ026+1 种基金Natural Science Foundation of Shandong province,No.ZR202111250163Yantai Science and Technology Plan Project,No.2022YD062.
文摘BACKGROUND Impaired glucose tolerance(IGT)is a homeostatic state between euglycemia and hyperglycemia and is considered an early high-risk state of diabetes.When IGT occurs,insulin sensitivity decreases,causing a reduction in insulin secretion and an increase in glucagon secretion.Recently,vascular endothelial growth factor B(VEGFB)has been demonstrated to play a positive role in improving glucose metabolism and insulin sensitivity.Therefore,we constructed a mouse model of IGT through high-fat diet feeding and speculated that VEGFB can regulate hyperglycemia in IGT by influencing insulin-mediated glucagon secretion,thus contributing to the prevention and cure of prediabetes.AIM To explore the potential molecular mechanism and regulatory effects of VEGFB on insulin-mediated glucagon in mice with IGT.METHODS We conducted in vivo experiments through systematic VEGFB knockout and pancreatic-specific VEGFB overexpression.Insulin and glucagon secretions were detected via enzyme-linked immunosorbent assay,and the protein expression of phosphoinositide 3-kinase(PI3K)/protein kinase B(AKT)was determined using western blot.Further,mRNA expression of forkhead box protein O1,phosphoenolpyruvate carboxykinase,and glucose-6 phosphatase was detected via quantitative polymerase chain reaction,and the correlation between the expression of proteins was analyzed via bioinformatics.RESULTS In mice with IGT and VEGFB knockout,glucagon secretion increased,and the protein expression of PI3K/AKT decreased dramatically.Further,in mice with VEGFB overexpression,glucagon levels declined,with the activation of the PI3K/AKT signaling pathway.CONCLUSION VEGFB/vascular endothelial growth factor receptor 1 can promote insulin-mediated glucagon secretion by activating the PI3K/AKT signaling pathway to regulate glucose metabolism disorders in mice with IGT.
文摘BACKGROUND Holoprosencephaly(HPE)is a congenital malformation with various degrees of incomplete separation of the cerebral hemispheres due to differentiation disorders of the forebrain.Although HPE with diabetes insipidus due to associated pituitary dysfunction has been reported,HPE with the syndrome of inappropriate antidiuretic hormone secretion(SIADH)is very rare.Tolvaptan,a vasopressin V2 receptor antagonist,is effective in adults with SIADH.However,there is no report of its efficacy in infants with SIADH.The purpose of this report is to demonstrate that tolvaptan is effective for SIADH in infants and that administration of tolvaptan eliminates the need for restriction of water intake and sodium administration.CASE SUMMARY A 2414-g female infant was born at 38 wk by normal vaginal delivery.Facial anomalies and head magnetic resonance imaging indicated semilobar HPE.After birth,she had hyponatremia due to SIADH and was treated using water and sodium restriction.However,she developed an exaggerated response to the fluid restrictions,resulting in large fluctuations in serum sodium levels.Subsequent administration of tolvaptan improved the fluctuations in serum sodium levels without the need for adjustment of water or sodium administration.Serum sodium was maintained within the normal range after discontinuation of tolvaptan at 80 d of life.There were no side effects,such as hypernatremia or liver dysfunction,during the administration of tolvaptan.CONCLUSION This is the first report on the safety and efficacy of tolvaptan in an infant with SIADH associated with HPE.
文摘Objective: To study the application effect of mouth-opening training sticks combined with oral massage on patients with mouth-opening difficulty after treatment for head and neck cancer. Methods: Using convenient sampling, 60 patients with mouth-opening difficulty after treatment for head and neck cancer admitted to the Oncology Department from February 2022 to October 2023 were selected for a 2-week exercise and nursing program. The patients were divided into a control group (February 1, 2022 to November 30, 2022) and an observation group (December 1, 2022 to October 31, 2023), with 30 patients in each group. The control group underwent routine mouth-opening functional exercises combined with cork for oral support training, while the observation group underwent routine mouth-opening functional exercises combined with oral massage and mouth-opening training sticks for oral support training. The mouth-opening degree, mouth-opening difficulty level, comfort level, compliance, and quality of life were observed in both groups. Results: Before the intervention, there were no statistically significant differences in mouth-opening degree and mouth-opening difficulty level between the two groups (P > 0.05). After the intervention, the mouth-opening degree, mouth-opening difficulty level, oral comfort level, compliance, and QLICP-HN scores in the observation group were all better than those in the control group, with statistically significant differences (P < 0.05). Conclusion: The combination of mouth-opening training sticks and oral massage with mouth-opening functional exercises can effectively improve the degree of mouth-opening difficulty, enhance oral comfort, increase compliance with mouth-opening exercises, and improve quality of life.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金Project supported by the Offline Course Program of“Experiment of College Physics”in the 2022-year Anhui Provincial Quality Engineering Program (Grant No.2022xxkc134)the Program for Academic Leader Reserve Candidates in Tongling University (Grant Nos.2020tlxyxs43 and 2014tlxyxs30)+1 种基金the Talent Scientific Research Foundation of Tongling University (Grant No.2015tlxyrc01)the 2014 year Program for Excellent Youth Talents in University of Anhui Province。
文摘In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金Supported by the National Natural Science Foundation of China(91528303)CNOOC Technology Project(2021-KT-YXKY-05).
文摘The coupling relationship between shelf-edge deltas and deep-water fan sand bodies is a hot and cutting-edge field of international sedimentology and deep-water oil and gas exploration.Based on the newly acquired high-resolution 3D seismic,logging and core data of Pearl River Mouth Basin(PRMB),this paper dissected the shelf-edge delta to deep-water fan(SEDDF)depositional system in the Oligocene Zhuhai Formation of Paleogene in south subsag of Baiyun Sag,and revealed the complex coupling relationship from the continental shelf edge to deep-water fan sedimentation and its genetic mechanisms.The results show that during the deposition of the fourth to first members of the Zhuhai Formation,the scale of the SEDDF depositional system in the study area showed a pattern of first increasing and then decreasing,with deep-water fan developed in the third to first members and the largest plane distribution scale developed in the late stage of the second member.Based on the development of SEDDF depositional system along the source direction,three types of coupling relationships are divided,namely,deltas that are linked downdip to fans,deltas that lack downdip fans and fans that lack updip coeval deltas,with different depositional characteristics and genetic mechanisms.(1)Deltas that are linked downdip to fans:with the development of shelf-edge deltas in the shelf area and deep-water fans in the downdip slope area,and the strong source supply and relative sea level decline are the two key factors which control the development of this type of source-to-sink(S2S).The development of channels on the continental shelf edge is conducive to the formation of this type of S2S system even with weak source supply and high sea level.(2)Deltas that lack downdip fans:with the development of shelf edge deltas in shelf area,while deep water fans are not developed in the downdip slope area.The lack of“sources”and“channels”,and fluid transformation are the three main reasons for the formation of this type of S2S system.(3)Fans that lack updip coeval deltas:with the development of deep-water fans in continental slope area and the absence of updip coeval shelf edge deltas,which is jointly controlled by the coupling of fluid transformation at the shelf edge and the“channels”in the continental slope area.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.
基金supported by the Natural Science Research Project of colleges and Universities in Anhui Province[2022AH052336]High Level Talent Research Initiation Fund Of Anhui Medical College[2023RC004]。
文摘Objective Microcystin-leucine-arginine(MC-LR)exposure induces lipid metabolism disorders in the liver.Secreted frizzled-related protein 5(SFRP5)is a natural antagonist of winglesstype MMTV integration site family,member 5A(Wnt5a)and an anti-inflammatory adipocytokine.In this study,we aimed to investigate whether MC-LR can induce lipid metabolism disorders in hepatocytes and whether SFRP5,which has anti-inflammatory effects,can alleviate the effects of hepatic lipid metabolism by inhibiting the Wnt5a/Jun N-terminal kinase(JNK)pathway.Methods We exposed mice to MC-LR in vivo to induce liver lipid metabolism disorders.Subsequently,mouse hepatocytes that overexpressed SFRP5 or did not express SFRP5 were exposed to MC-LR,and the effects of SFRP5 overexpression on inflammation and Wnt5a/JNK activation by MC-LR were observed.Results MC-LR exposure induced liver lipid metabolism disorders in mice and significantly decreased SFRP5 mRNA and protein levels in a concentration-dependent manner.SFRP5 overexpression in AML12cells suppressed MC-LR-induced inflammation.Overexpression of SFRP5 also inhibited Wnt5a and phosphorylation of JNK.Conclusion MC-LR can induce lipid metabolism disorders in mice,and SFRP5 can attenuate lipid metabolism disorders in the mouse liver by inhibiting Wnt5a/JNK signaling.
基金The National Natural Science Foundation of China under contract No.42276066the Key Research and Development Program(International Science and Technology Cooperation Development Program)of Hainan Province under contract No.GHYF2022009the Youth Innovation Promotion Association of CAS under contract No.2018401.
文摘Based on high-resolution 3D seismic data acquired in the Pearl(Zhujiang)River Mouth Basin of the northern South China Sea,this study investigated the geometry,spatial extension,and throw distribution of the post-rift normal fault through detailed seismic interpretation and fault modeling.A total of 289 post-rift normal faults were identified in the study area and can be classified into four types:(1)isolated normal faults above the carbonate platform;(2)isolated normal faults cutting through the carbonate platform;(3)conjugate normal faults,and(4)connecting normal faults.Throw distribution analysis on the fault planes show that the vertical throw profiles of most normal fault exhibit flat-topped profiles.Isolated normal faults above the carbonate platform exhibit roughly concentric ellipses with maximum throw zones in the central section whereas the normal faults cutting through the carbonate platform miss the lowermost section due to the chaotic seismic reflections in the interior of the carbonate platform.The vertical throws of conjugate normal faults anomalously decrease toward their intersection region on the fault plane whereas the connecting normal faults present two maximum throw zones in the central section of the fault plane.According to the symmetric elliptical distribution model of fault throw,an estimation was made indicating that normal faults cutting through the carbonate platform extended downward between-1308 s and-1780 s(two-way travel time)in depth and may not penetrate the entire Liuhua carbonate platform.Moreover,it is observed that the distribution of karst caves on the top of the carbonate platform disaccord with those of hydrocarbon reservoirs and the post-rift normal faults cutting through the carbonate platform in the study area.We propose that these karst caves formed most probably by corrosive fluids derived from magmatic activities during the Dongsha event,rather than pore waters or hydrocarbons.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.