Using super resolution direction of arrival(DOA) estimation algorithm to reduce the resolution angle is an effective method for passive radar seeker(PRS) to antagonize non-coherent radar decoy.Considering the powe...Using super resolution direction of arrival(DOA) estimation algorithm to reduce the resolution angle is an effective method for passive radar seeker(PRS) to antagonize non-coherent radar decoy.Considering the power and correlation property between radar and non-coherent decoy,an improved subspace DOA estimation method based on traditional subspace algorithm is proposed.Because this new method uses the invariance property of noise subspace,compared with traditional MUSIC algorithm,it shows not only better resolution in condition of closely spaced sources,but also superior performance in case of different power or partially correlated sources.Using this new method,PRS can distinguish radar and non-coherent decoy with good performance.Both the simulation result and the experimental data confirm the performance of the method.展开更多
Recent progress in the treatment of Alzheimer’s disease(AD)using antibodies against amyloid sustains amyloid generation as a key process in AD.Amyloid formation starts with two amyloidbeta(Aβ)molecules interacting(d...Recent progress in the treatment of Alzheimer’s disease(AD)using antibodies against amyloid sustains amyloid generation as a key process in AD.Amyloid formation starts with two amyloidbeta(Aβ)molecules interacting(dimer formation)followed by an accelerating build-up of socalled protofibrils,which turn into fibrils,which accumulate in the characteristic plaques.展开更多
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t...Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources.展开更多
In the present study,we investigated the synergistic effects of targeted methotrexate-selenium nanostructure containing Myc decoy oligodeoxynucleotides along with X-irradiation exposure as a combination therapy on LNC...In the present study,we investigated the synergistic effects of targeted methotrexate-selenium nanostructure containing Myc decoy oligodeoxynucleotides along with X-irradiation exposure as a combination therapy on LNCaP prostate cancer cells.Myc decoy ODNs were designed based on the promoter of Bcl-2 gene and analyzed by molecular docking and molecular dynamics assays.ODNs were loaded on the synthesized Se@BSA@Chi-MTX nanostructure.The physicochemical characteristics of nanostructures were determined by FTIR,DLS,UV-vis,TEM,EDX,in vitro release,and hemolysis tests.Subsequently,the cytotoxicity properties of them with and without X-irradiation were investigated by uptake,MTT,cell cycle,apoptosis,and scratch assays on the LNCaP cell line.The results of DLS and TEM showed negative charge(−9 mV)and nanometer size(40 nm)for Se@BSA@Chi-DEC-MTX NPs,respectively.The results of FTIR,UV-vis,and EDX showed the proper interaction of different parts and the correct synthesis of nanoparticles.The results of hemolysis showed the hemocompatibility of this nanoparticle in concentrations less than 6 mg/mL.The ODNs release from the nanostructures showed a pH-dependent manner,and the release rate was 15%higher in acidic pH.The targeted Se@BSA@Chi-labeled ODN-MTX NPs were efficiently taken up by LNCaP cells by targeting the prostate-specific membrane antigen(PSMA).The significant synergistic effects of nanostructure(containing MTX drug)treatment along with X-irradiation showed cell growth inhibition,apoptosis induction(~57%),cell cycle arrest(G2/M phase),and migration inhibition(up to 90%)compared to the control.The results suggested that the Se@BSA@Chi-DEC-MTX NPs can potentially suppress the cell growth of LNCaP cells.This nanostructure system can be a promising approach for targeted drug delivery and chemoradiotherapy in prostate cancer treatment.展开更多
Minimal cut sets (or prime implicants: minimal combinations of basic event conditions leading to system failure) are important information for reliability/safety analysis and design. To obtain minimal cut sets for ...Minimal cut sets (or prime implicants: minimal combinations of basic event conditions leading to system failure) are important information for reliability/safety analysis and design. To obtain minimal cut sets for general non-coherent fault trees, including negative basic events or multi-valued basic events, a special procedure such as the consensus rule must be applied to the results obtained by logical operations for coherent fault trees, which will require more steps and time. This paper proposes a simple method for a non-coherent fault tree, whose top event is represented as an AND combination of monotonic sub-trees. A "monotonic" sub-tree means that it does not have both positive and negative representations for each basic event. It is proven that minimal cut sets can be obtained by a conventional method for coherent fault trees. An illustrative example of a simple event tree analysis shows the detail and characteristics of the proposed method.展开更多
The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m s...The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m series to do non-coherent integration. It is indicated that the power in- creasing times of larger target sidelobe is less than the power increasing times of smaller target main- lobe because of the larger target' s pseudo-randomness. Smaller target is integrated from larger tar- get sidelobe, which strengthens the detection capability of radar for smaller targets. According to the sidelobes distributing characteristic, a method is presented in this paper to remove the estimated sidelobes mean value for signal detection after non-coherent integration. Simulation results present that the SNR of small target can be improved approximately 6. 5 dB by the proposed method.展开更多
The satellite-based automatic identification system (AIS) receiver has to encounter the frequency offset caused by the Doppler effect and the oscillator instability. This paper proposes a non-coherent sequence detecti...The satellite-based automatic identification system (AIS) receiver has to encounter the frequency offset caused by the Doppler effect and the oscillator instability. This paper proposes a non-coherent sequence detection scheme for the satellite-based AIS signal transmitted over the white Gaussian noise channel. Based on the maximum likelihood estimation and a Viterbi decoder, the proposed scheme is capable of tolerating a frequency offset up to 5% of the symbol rate. The complexity of the proposed scheme is reduced by the state-complexity reduction, which is based on per-survivor processing. Simulation results prove that the proposed non-coherent sequence detection scheme has high robustness to frequency offset compared to the relative scheme when messages collision exists.展开更多
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant...Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.展开更多
文摘Using super resolution direction of arrival(DOA) estimation algorithm to reduce the resolution angle is an effective method for passive radar seeker(PRS) to antagonize non-coherent radar decoy.Considering the power and correlation property between radar and non-coherent decoy,an improved subspace DOA estimation method based on traditional subspace algorithm is proposed.Because this new method uses the invariance property of noise subspace,compared with traditional MUSIC algorithm,it shows not only better resolution in condition of closely spaced sources,but also superior performance in case of different power or partially correlated sources.Using this new method,PRS can distinguish radar and non-coherent decoy with good performance.Both the simulation result and the experimental data confirm the performance of the method.
基金supported by several grant agencies as stated in the full paper(to LT)。
文摘Recent progress in the treatment of Alzheimer’s disease(AD)using antibodies against amyloid sustains amyloid generation as a key process in AD.Amyloid formation starts with two amyloidbeta(Aβ)molecules interacting(dimer formation)followed by an accelerating build-up of socalled protofibrils,which turn into fibrils,which accumulate in the characteristic plaques.
基金the National Natural Science Foundation of China(Grant No.62101579).
文摘Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources.
基金Zanjan University of Medical Sciences supported the present study(Grant Number:A-12-1244-18).
文摘In the present study,we investigated the synergistic effects of targeted methotrexate-selenium nanostructure containing Myc decoy oligodeoxynucleotides along with X-irradiation exposure as a combination therapy on LNCaP prostate cancer cells.Myc decoy ODNs were designed based on the promoter of Bcl-2 gene and analyzed by molecular docking and molecular dynamics assays.ODNs were loaded on the synthesized Se@BSA@Chi-MTX nanostructure.The physicochemical characteristics of nanostructures were determined by FTIR,DLS,UV-vis,TEM,EDX,in vitro release,and hemolysis tests.Subsequently,the cytotoxicity properties of them with and without X-irradiation were investigated by uptake,MTT,cell cycle,apoptosis,and scratch assays on the LNCaP cell line.The results of DLS and TEM showed negative charge(−9 mV)and nanometer size(40 nm)for Se@BSA@Chi-DEC-MTX NPs,respectively.The results of FTIR,UV-vis,and EDX showed the proper interaction of different parts and the correct synthesis of nanoparticles.The results of hemolysis showed the hemocompatibility of this nanoparticle in concentrations less than 6 mg/mL.The ODNs release from the nanostructures showed a pH-dependent manner,and the release rate was 15%higher in acidic pH.The targeted Se@BSA@Chi-labeled ODN-MTX NPs were efficiently taken up by LNCaP cells by targeting the prostate-specific membrane antigen(PSMA).The significant synergistic effects of nanostructure(containing MTX drug)treatment along with X-irradiation showed cell growth inhibition,apoptosis induction(~57%),cell cycle arrest(G2/M phase),and migration inhibition(up to 90%)compared to the control.The results suggested that the Se@BSA@Chi-DEC-MTX NPs can potentially suppress the cell growth of LNCaP cells.This nanostructure system can be a promising approach for targeted drug delivery and chemoradiotherapy in prostate cancer treatment.
文摘Minimal cut sets (or prime implicants: minimal combinations of basic event conditions leading to system failure) are important information for reliability/safety analysis and design. To obtain minimal cut sets for general non-coherent fault trees, including negative basic events or multi-valued basic events, a special procedure such as the consensus rule must be applied to the results obtained by logical operations for coherent fault trees, which will require more steps and time. This paper proposes a simple method for a non-coherent fault tree, whose top event is represented as an AND combination of monotonic sub-trees. A "monotonic" sub-tree means that it does not have both positive and negative representations for each basic event. It is proven that minimal cut sets can be obtained by a conventional method for coherent fault trees. An illustrative example of a simple event tree analysis shows the detail and characteristics of the proposed method.
基金Supported by the National Natural Science Foundation of China(Youth Science Fund)(61001190)
文摘The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m series to do non-coherent integration. It is indicated that the power in- creasing times of larger target sidelobe is less than the power increasing times of smaller target main- lobe because of the larger target' s pseudo-randomness. Smaller target is integrated from larger tar- get sidelobe, which strengthens the detection capability of radar for smaller targets. According to the sidelobes distributing characteristic, a method is presented in this paper to remove the estimated sidelobes mean value for signal detection after non-coherent integration. Simulation results present that the SNR of small target can be improved approximately 6. 5 dB by the proposed method.
文摘The satellite-based automatic identification system (AIS) receiver has to encounter the frequency offset caused by the Doppler effect and the oscillator instability. This paper proposes a non-coherent sequence detection scheme for the satellite-based AIS signal transmitted over the white Gaussian noise channel. Based on the maximum likelihood estimation and a Viterbi decoder, the proposed scheme is capable of tolerating a frequency offset up to 5% of the symbol rate. The complexity of the proposed scheme is reduced by the state-complexity reduction, which is based on per-survivor processing. Simulation results prove that the proposed non-coherent sequence detection scheme has high robustness to frequency offset compared to the relative scheme when messages collision exists.
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
文摘Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.