Comprehensively considering energy, volume and electronic structure of alloys, the ninth equation was determined as the interaction function of Nb-Mo alloys system in BCC structure on the basis of idea of systematic s...Comprehensively considering energy, volume and electronic structure of alloys, the ninth equation was determined as the interaction function of Nb-Mo alloys system in BCC structure on the basis of idea of systematic science of alloys, experimental lattice constants and heats of formation of disordered Nb(1-x)Mox alloys. The structural parameters and properties of Nb and Mo characteristic atoms sequences and corresponding characteristic crystals sequences were determined in Nb-Mo alloys system. The electronic structure and physical properties of disordered Nb(1-x)Mox alloys system were calculated according to concentration of characteristic atoms of disordered alloys. The change trend of physical properties is the same as that of electronic structure.展开更多
Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher ...Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.展开更多
Iron-sulfur clusters(ISC)are essential cofactors for proteins involved in various biological processes,such as electron transport,biosynthetic reactions,DNA repair,and gene expression regulation.ISC assembly protein I...Iron-sulfur clusters(ISC)are essential cofactors for proteins involved in various biological processes,such as electron transport,biosynthetic reactions,DNA repair,and gene expression regulation.ISC assembly protein IscA1(or MagR)is found within the mitochondria of most eukaryotes.Magnetoreceptor(MagR)is a highly conserved A-type iron and iron-sulfur cluster-binding protein,characterized by two distinct types of iron-sulfur clusters,[2Fe-2S]and[3Fe-4S],each conferring unique magnetic properties.MagR forms a rod-like polymer structure in complex with photoreceptive cryptochrome(Cry)and serves as a putative magnetoreceptor for retrieving geomagnetic information in animal navigation.Although the N-terminal sequences of MagR vary among species,their specific function remains unknown.In the present study,we found that the N-terminal sequences of pigeon MagR,previously thought to serve as a mitochondrial targeting signal(MTS),were not cleaved following mitochondrial entry but instead modulated the efficiency with which iron-sulfur clusters and irons are bound.Moreover,the N-terminal region of MagR was required for the formation of a stable MagR/Cry complex.Thus,the N-terminal sequences in pigeon MagR fulfil more important functional roles than just mitochondrial targeting.These results further extend our understanding of the function of MagR and provide new insights into the origin of magnetoreception from an evolutionary perspective.展开更多
Kizmaz [13] studied the difference sequence spaces ∞(A), c(A), and co(A). Several article dealt with the sets of sequences of m-th order difference of which are bounded, convergent, or convergent to zero. Alta...Kizmaz [13] studied the difference sequence spaces ∞(A), c(A), and co(A). Several article dealt with the sets of sequences of m-th order difference of which are bounded, convergent, or convergent to zero. Altay and Basar [5] and Altay, Basar, and Mursaleen [7] introduced the Euler sequence spaces e0^r, ec^r, and e∞^r, respectively. The main purpose of this article is to introduce the spaces e0^r△^(m)), ec^r△^(m)), and e∞^r△^(m))consisting of all sequences whose mth order differences are in the Euler spaces e0^r, ec^r, and e∞^r, respectively. Moreover, the authors give some topological properties and inclusion relations, and determine the α-, β-, and γ-duals of the spaces e0^r△^(m)), ec^r△^(m)), and e∞^r△^(m)), and the Schauder basis of the spaces e0^r△^(m)), ec^r△^(m)). The last section of the article is devoted to the characterization of some matrix mappings on the sequence space ec^r△^(m)).展开更多
In the past, several authors studied spaces of m-th order difference sequences, among them, H.Polat and F.Basar ([17]) defined the Euler spaces of m-th order difference sequences e r 0 (△ ( m ) ), e r c (△ (...In the past, several authors studied spaces of m-th order difference sequences, among them, H.Polat and F.Basar ([17]) defined the Euler spaces of m-th order difference sequences e r 0 (△ ( m ) ), e r c (△ ( m ) ) and e r ∞ (△ ( m ) ) and characterized some classes of matrix transformations on them. In our paper, we add a new supplementary aspect to their research by characterizing classes of compact operators on those spaces. For that purpose, the spaces are treated as the matrix domains of a triangle in the classical sequence spaces c 0 , c and ∞ . The main tool for our characterizations is the Hausdorff measure of noncompactness.展开更多
In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic ...In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks.展开更多
There are complex and regular changes on sedimentary facies from the Early to the Middle Triassic in the Nanpanjiang basin. After the obvious drowned event of carbonate platforms in the transitional period between Per...There are complex and regular changes on sedimentary facies from the Early to the Middle Triassic in the Nanpanjiang basin. After the obvious drowned event of carbonate platforms in the transitional period between Permian and Triassic, carbonate platforms have evolved into the ramp type from the rimmed shelf type. The differentiation of sedimentary facies becomes clearer in space, which are marked by the changes from an attached platform to a turbidity basin and several isolated platforms in the basin. The striking characteristics are the development of oolitic banks on isolated platforms in Nanning and Jingxi and the reef and bank limestones in the margin of the attached platform in the Early Triassic. Despite the difference of the time span and the architecture of facies succession of third order sedimentary sequences, the process of the third order relative sea level changes reflected by the sedimentary facies succession of the third order sequences is generally synchronous. Therefore, six third order sequences could be discerned in the strata from the Early to the Middle Triassic in the Nanpanjiang basin. Using two types of facies changing surfaces and two types of diachronisms in stratigraphic records as the key elements, the sedimentary facies architectures of the third order sequences that represent sequence stratigraphic frameworks from the Early to the Middle Triassic in the Nanpanjiang basin could be constructed.展开更多
Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using co...Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using complementary DNA (cDNA) derived from messenger RNA (mRNA) extracted from plant tissues and generated by reverse transcription. However, some CDS are difficult to acquire through this process as they are expressed at extremely low levels or have specific spatial and/or temporal expression patterns in vivo. These challenges require the development of alternative CDS cloning technologies. In this study, we found that the genomic intron-containing gene coding sequences (gDNA) from Arabidopsis thaliana, Oryza sativa, Brassica napus, and Glycine max can be correctly transcribed and spliced into mRNA in Nicotiana benthamiana. In contrast, gDNAs from Triticum aestivum and Sorghum bicolor did not function correctly. In transient expression experiments, the target DNA sequence is driven by a constitutive promoter. Theoretically, a sufficient amount of mRNA can be extracted from the N. benthamiana leaves, making it conducive to the cloning of CDS target genes. Our data demonstrate that N. benthamiana can be used as an effective host for the cloning CDS of plant genes.展开更多
In this article, using generalized weighted mean and difference matrix of order m, we introduce the paranormed sequence space l(u, v, p; △(m)), which consist of the sequences whose generalized weighted △(m)-di...In this article, using generalized weighted mean and difference matrix of order m, we introduce the paranormed sequence space l(u, v, p; △(m)), which consist of the sequences whose generalized weighted △(m)-difference means are in the linear space l(p) defined by I.J.Maddox. Also, we determine the basis of this space and compute its α-, β- and γ-duals. Further, we give the characterization of the classes of matrix mappings from l(u, v, p, △(m)) to l∞, c, and co. Finally, we apply the Hausdorff measure of noncompacness to characterize some classes of compact operators given by matrices on the space lp(U, v, △(m)) (1 ≤ p 〈 ∞).展开更多
Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear comp...Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear complexity,minimal polynomial,and autocorrelation are investigated.The results show that these sequences have a large linear complexity when 2∈D1,which means they can resist the Berlekamp-Massey attack.Furthermore,the autocorrelation values are close to 0 with a probability of approximately 1?1/r.Therefore,when r is a big prime,the new sequence has a good autocorrelation.展开更多
Let p =ef +1 be an odd prime with positive integers e and f. In this paper, we calculate the values of Gauss periods of order e =3, 4, 6 over a finite field GF(q), where q is a prime with q≠p. As applications, severa...Let p =ef +1 be an odd prime with positive integers e and f. In this paper, we calculate the values of Gauss periods of order e =3, 4, 6 over a finite field GF(q), where q is a prime with q≠p. As applications, several cyclotomic sequences of order e =3, 4, 6 are employed to construct a number of classes of cyclic codes over GF(q) with prime length. Under certain conditions, the linear complexity and reciprocal minimal polynomials of cyclotomic sequences are calculated, and the lower bounds on the minimum distances of these cyclic codes are obtained.展开更多
Background The reliance on a solitary linear reference genome has imposed a significant constraint on our compre-hensive understanding of genetic variation in animals.This constraint is particularly pronounced for non...Background The reliance on a solitary linear reference genome has imposed a significant constraint on our compre-hensive understanding of genetic variation in animals.This constraint is particularly pronounced for non-reference sequences(NRSs),which have not been extensively studied.Results In this study,we constructed a pig pangenome graph using 21 pig assemblies and identified 23,831 NRSs with a total length of 105 Mb.Our findings revealed that NRSs were more prevalent in breeds exhibiting greater genetic divergence from the reference genome.Furthermore,we observed that NRSs were rarely found within coding sequences,while NRS insertions were enriched in immune-related Gene Ontology terms.Notably,our investigation also unveiled a close association between novel genes and the immune capacity of pigs.We observed substantial differences in terms of frequencies of NRSs between Eastern and Western pigs,and the heat-resistant pigs exhibited a substantial number of NRS insertions in an 11.6 Mb interval on chromosome X.Additionally,we discovered a 665 bp insertion in the fourth intron of the TNFRSF19 gene that may be associated with the ability of heat tolerance in South-ern Chinese pigs.Conclusions Our findings demonstrate the potential of a graph genome approach to reveal important functional features of NRSs in pig populations.展开更多
Objective:To address the phylogenetic and phylogeographic relationship between different lineages of Anopheles(An.)subpictus species complex in most parts of the Asian continent by maximum utilization of Internal Tran...Objective:To address the phylogenetic and phylogeographic relationship between different lineages of Anopheles(An.)subpictus species complex in most parts of the Asian continent by maximum utilization of Internal Transcriber Spacer 2(ITS2)and cytochrome C oxidase I(COI)sequences deposited at the GenBank.Methods:Seventy-five ITS2,210 COI and 26 concatenated sequences available in the NCBI database were used.Phylogenetic analysis was performed using Bayesian likelihood trees,whereas median-joining haplotype networks and time-scale divergence trees were generated for phylogeographic analysis.Genetic diversity indices and genetic differentiation were also calculated.Results:Two genetically divergent molecular forms of An.subpictus species complex corresponding to sibling species A and B are established.Species A evolved around 37-82 million years ago in Sri Lanka,India,and the Netherlands,and species B evolved around 22-79 million years ago in Sri Lanka,India,and Myanmar.Vietnam,Thailand,and Cambodia have two molecular forms:one is phylogenetically similar to species B.Other forms differ from species A and B and evolved recently in the above mentioned countries,Indonesia and the Philippines.Genetic subdivision among Sri Lanka,India,and the Netherlands is almost absent.A substantial genetic differentiation was obtained for some populations due to isolation by large geographical distances.Genetic diversity indices reveal the presence of a long-established stable mosquito population,at mutation-drift equilibrium,regardless of population fluctuations.Conclusions:An.subpictus species complex consists of more than two genetically divergent molecular forms.Species A is highly divergent from the rest.Sri Lanka and India contain only species A and B.展开更多
In the present paper,we mostly focus on P_(p)^(2)-statistical convergence.We will look into the uniform integrability via the power series method and its characterizations for double sequences.Also,the notions of P_(p...In the present paper,we mostly focus on P_(p)^(2)-statistical convergence.We will look into the uniform integrability via the power series method and its characterizations for double sequences.Also,the notions of P_(p)^(2)-statistically Cauchy sequence,P_(p)^(2)-statistical boundedness and core for double sequences will be described in addition to these findings.展开更多
Type division and controlling factor analysis of 3rd-order sequence are of practical significance to tec-tonic analysis, sedimentary environment identification, and other geological researches. Based on the comprehens...Type division and controlling factor analysis of 3rd-order sequence are of practical significance to tec-tonic analysis, sedimentary environment identification, and other geological researches. Based on the comprehensive analysis of carbon and oxygen isotope trends, paleobathymetry and spectral-frequency of representative well logs, 3rd-order sequences can be divided into 3 types: (a) global sea level (GSL) sequence mainly controlled by GSL change;(b) tectonic sequence mainly controlled by regional tectonic activity;and (c) composite sequence jointly controlled by GSL change and regional tectonic activity. This study aims to identify the controlling factors of 3rd-order sequences and to illustrate a new method for classification of 3rd-order sequences of the middle Permian strata in the Sichuan Basin, China. The middle Permian strata in the Sichuan Basin consist of 3 basin-contrastive 3rd-order sequences, i.e., PSQ1, PSQ2 and PSQ3. Of these, PSQ1 is a GSL sequence while PSQ2 and PSQ3 are composite sequences. The results suggest that the depositional environment was stable during the deposition of PSQ1, but was activated by tectonic activity during the deposition of the middle Permian Maokou Formation.展开更多
To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage p...To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage probability leveraging spatio-temporal finite multilayer fragments distribution and the target damage assessment algorithm based on cloud model theory.Drawing on the spatial dispersion characteristics of fragments of projectile proximity explosion,we divide into a finite number of fragments distribution planes based on the time series in space,set up a fragment layer dispersion model grounded in the time series and intersection criterion for determining the effective penetration of each layer of fragments into the target.Building on the precondition that the multilayer fragments of the time series effectively assail the target,we also establish the damage criterion of the perforation and penetration damage and deduce the damage probability calculation model.Taking the damage probability of the fragment layer in the spatio-temporal sequence to the target as the input state variable,we introduce cloud model theory to research the target damage assessment method.Combining the equivalent simulation experiment,the scientific and rational nature of the proposed method were validated through quantitative calculations and comparative analysis.展开更多
The present study is devoted to understanding the evolution of the Upper Jurassic Sab'atayn Formation in the Marib-Shabwa Basin,Yemen,through a sequence stratigraphic analysis based on integrating datasets of sedi...The present study is devoted to understanding the evolution of the Upper Jurassic Sab'atayn Formation in the Marib-Shabwa Basin,Yemen,through a sequence stratigraphic analysis based on integrating datasets of sedimentology,seismic sections,and well logs.The Sab'atayn Formation(Tithonian age)is represented by a series of clastic and evaporites that were deposited under fluvio-deltaic to prodeltaic settings.It is divided into four members including Yah(at the base),upwards to Seen,Alif,and Safir at the top.Two third-order depositional sequences were determined for the Tithonian succession which were separated by three sequence boundaries.These sequences were classified into their systems tracts signifying several sedimentation patterns of progradational,aggradational,and retrogradational parasequence sets.The first depositional sequence corresponds to the early-middle Tithonian Yah and Seen units that can be classified into lowstand,transgressive,and highstand systems tracts.The second sequence comprises the late Tithonian Alif unit that can be subdivided into transgressive and highstand systems tracts.The sandy deposits of the Alif Member(highstand deposits)represent the most productive hydrocarbon reservoir in the basin.The Upper Jurassic sediments in the study area were resulted from a combination of eustatic and tectonic effects.展开更多
Genetic manipulation(either restraint or enhancement)of the biosynthesis pathway ofα-linolenic acid(ALA)in seed oil is an important goal in Brassica napus breeding.B.napus is a tetraploid plant whose genome often har...Genetic manipulation(either restraint or enhancement)of the biosynthesis pathway ofα-linolenic acid(ALA)in seed oil is an important goal in Brassica napus breeding.B.napus is a tetraploid plant whose genome often har-bors four and six homologous copies,respectively,of the two fatty acid desaturases FAD2 and FAD3,which con-trol the last two steps of ALA biosynthesis during seed oil accumulation.In this study,we compared their promoters,coding sequences,and expression levels in three high-ALA inbred lines 2006L,R8Q10,and YH25005,a low-ALA line A28,a low-ALA/high-oleic-acid accession SW,and the wildtype ZS11.The expression levels of most FAD2 and FAD3 homologs in the three high-ALA accessions were higher than those in ZS11 and much higher than those in A28 and SW.The three high-ALA accessions shared similar sequences with the pro-moters and CDSs of BnFAD3.C4 and BnFAD3.A3.In A28 and SW,substitution of three amino acid residues in BnFAD2.A5 and BnFAD2.C5,an absence of BnFAD2.C1 locus,and a 549 bp long deletion on the BnFAD3.A3 promoter were detected.The profile of BnFAD2 mutation in the two low-ALA accessions A28 and SW is different from that reported in previous studies.The mutations in BnFAD3 in the high-ALA accessions are reported for thefirst time.In identifying the sites of these mutations,we provide detailed information to aid the design of mole-cular markers for accelerated breeding schemes.展开更多
Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all whil...Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all while upholding image quality.Moreover,an increasing number of hospitals are embracing cloud computing for patient data storage,necessitating meticulous scrutiny of server security and privacy protocols.Nevertheless,considering the widespread availability of multimedia tools,the preservation of digital data integrity surpasses the significance of compression alone.In response to this concern,we propose a secure storage and transmission solution for compressed medical image sequences,such as ultrasound images,utilizing a motion vector watermarking scheme.The watermark is generated employing an error-correcting code known as Bose-Chaudhuri-Hocquenghem(BCH)and is subsequently embedded into the compressed sequence via block-based motion vectors.In the process of watermark embedding,motion vectors are selected based on their magnitude and phase angle.When embedding watermarks,no specific spatial area,such as a region of interest(ROI),is used in the images.The embedding of watermark bits is dependent on motion vectors.Although reversible watermarking allows the restoration of the original image sequences,we use the irreversible watermarking method.The reason for this is that the use of reversible watermarks may impede the claims of ownership and legal rights.The restoration of original data or images may call into question ownership or other legal claims.The peak signal-to-noise ratio(PSNR)and structural similarity index(SSIM)serve as metrics for evaluating the watermarked image quality.Across all images,the PSNR value exceeds 46 dB,and the SSIM value exceeds 0.92.Experimental results substantiate the efficacy of the proposed technique in preserving data integrity.展开更多
Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in p...Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in plains due to multi-seam coal mining and the instability of natural bedding slopes, yet the cumulative impact of different mining sequences on bedding slopes has been less explored. This study combines drone surveys and geological data to construct a comprehensive three-dimensional model of bedding slopes. Utilizing FLAC3D and PFC2D models, derived from laboratory experiments, it simulates stress, deformation, and failure dynamics of slopes under various mining sequences. Incorporating fractal dimension analysis, the research evaluates the stability of slopes in relation to different mining sequences. The findings reveal that mining in an upslope direction minimizes disruption to overlying strata. Initiating extraction from lower segments increases tensile-shear stress in coal pillar overburdens, resulting in greater creep deformation towards the downslope than when starting from upper segments, potentially leading to localized landslides and widespread creep deformation in mined-out areas. The downslope upward mining sequence exhibits the least fractal dimensions, indicating minimal disturbance to both strata and surface. While all five mining scenarios maintain good slope stability under normal conditions, recalibrated stability assessments based on fractal dimensions suggest that downslope upward mining offers the highest stability under rainfall, contrasting with the lower stability and potential instability risks of upslope downward mining. These insights are pivotal for mining operations and geological hazard mitigation in multi-seam coal exploitation on bedding slopes.展开更多
基金Project (50954006) supported by the National Natural Science Foundation of ChinaProject (2009GK3152) supported by the Hunan Science and Technology Department, China+1 种基金Project (201012) supported by the Hunan Provincial Construction Department, ChinaProject (K1003048-11) supported by the Changsha City Science and Technology Department, China
文摘Comprehensively considering energy, volume and electronic structure of alloys, the ninth equation was determined as the interaction function of Nb-Mo alloys system in BCC structure on the basis of idea of systematic science of alloys, experimental lattice constants and heats of formation of disordered Nb(1-x)Mox alloys. The structural parameters and properties of Nb and Mo characteristic atoms sequences and corresponding characteristic crystals sequences were determined in Nb-Mo alloys system. The electronic structure and physical properties of disordered Nb(1-x)Mox alloys system were calculated according to concentration of characteristic atoms of disordered alloys. The change trend of physical properties is the same as that of electronic structure.
文摘Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.
基金supported by the National Natural Science Foundation of China(31640001 and T2350005 to C.X.,U21A20148 to X.Z.and C.X.)Ministry of Science and Technology of China(2021ZD0140300 to C.X.)+2 种基金Natural Science Foundation of Hainan Province(No.822RC703 for J.L.)Foundation of Hainan Educational Committee(No.Hnky2022-27 for J.L.)Presidential Foundation of Hefei Institutes of Physical Science,Chinese Academy of Sciences(Y96XC11131,E26CCG27,and E26CCD15 to C.X.,E36CWGBR24B and E36CZG14132 to T.C.)。
文摘Iron-sulfur clusters(ISC)are essential cofactors for proteins involved in various biological processes,such as electron transport,biosynthetic reactions,DNA repair,and gene expression regulation.ISC assembly protein IscA1(or MagR)is found within the mitochondria of most eukaryotes.Magnetoreceptor(MagR)is a highly conserved A-type iron and iron-sulfur cluster-binding protein,characterized by two distinct types of iron-sulfur clusters,[2Fe-2S]and[3Fe-4S],each conferring unique magnetic properties.MagR forms a rod-like polymer structure in complex with photoreceptive cryptochrome(Cry)and serves as a putative magnetoreceptor for retrieving geomagnetic information in animal navigation.Although the N-terminal sequences of MagR vary among species,their specific function remains unknown.In the present study,we found that the N-terminal sequences of pigeon MagR,previously thought to serve as a mitochondrial targeting signal(MTS),were not cleaved following mitochondrial entry but instead modulated the efficiency with which iron-sulfur clusters and irons are bound.Moreover,the N-terminal region of MagR was required for the formation of a stable MagR/Cry complex.Thus,the N-terminal sequences in pigeon MagR fulfil more important functional roles than just mitochondrial targeting.These results further extend our understanding of the function of MagR and provide new insights into the origin of magnetoreception from an evolutionary perspective.
文摘Kizmaz [13] studied the difference sequence spaces ∞(A), c(A), and co(A). Several article dealt with the sets of sequences of m-th order difference of which are bounded, convergent, or convergent to zero. Altay and Basar [5] and Altay, Basar, and Mursaleen [7] introduced the Euler sequence spaces e0^r, ec^r, and e∞^r, respectively. The main purpose of this article is to introduce the spaces e0^r△^(m)), ec^r△^(m)), and e∞^r△^(m))consisting of all sequences whose mth order differences are in the Euler spaces e0^r, ec^r, and e∞^r, respectively. Moreover, the authors give some topological properties and inclusion relations, and determine the α-, β-, and γ-duals of the spaces e0^r△^(m)), ec^r△^(m)), and e∞^r△^(m)), and the Schauder basis of the spaces e0^r△^(m)), ec^r△^(m)). The last section of the article is devoted to the characterization of some matrix mappings on the sequence space ec^r△^(m)).
基金supported by the research project#144003 of the Serbian Ministry of Science, Technology and Development
文摘In the past, several authors studied spaces of m-th order difference sequences, among them, H.Polat and F.Basar ([17]) defined the Euler spaces of m-th order difference sequences e r 0 (△ ( m ) ), e r c (△ ( m ) ) and e r ∞ (△ ( m ) ) and characterized some classes of matrix transformations on them. In our paper, we add a new supplementary aspect to their research by characterizing classes of compact operators on those spaces. For that purpose, the spaces are treated as the matrix domains of a triangle in the classical sequence spaces c 0 , c and ∞ . The main tool for our characterizations is the Hausdorff measure of noncompactness.
基金supported by the National Natural Science Foundation of China(Grant Nos.61161006 and 61573383)
文摘In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks.
基金ThestudyisjointlysupportedbytheChinaPetroleumCorporation (No .NPJ- 10 0 19)andalsobytheMinistryofScienceandTechnology (SSER)
文摘There are complex and regular changes on sedimentary facies from the Early to the Middle Triassic in the Nanpanjiang basin. After the obvious drowned event of carbonate platforms in the transitional period between Permian and Triassic, carbonate platforms have evolved into the ramp type from the rimmed shelf type. The differentiation of sedimentary facies becomes clearer in space, which are marked by the changes from an attached platform to a turbidity basin and several isolated platforms in the basin. The striking characteristics are the development of oolitic banks on isolated platforms in Nanning and Jingxi and the reef and bank limestones in the margin of the attached platform in the Early Triassic. Despite the difference of the time span and the architecture of facies succession of third order sedimentary sequences, the process of the third order relative sea level changes reflected by the sedimentary facies succession of the third order sequences is generally synchronous. Therefore, six third order sequences could be discerned in the strata from the Early to the Middle Triassic in the Nanpanjiang basin. Using two types of facies changing surfaces and two types of diachronisms in stratigraphic records as the key elements, the sedimentary facies architectures of the third order sequences that represent sequence stratigraphic frameworks from the Early to the Middle Triassic in the Nanpanjiang basin could be constructed.
文摘Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using complementary DNA (cDNA) derived from messenger RNA (mRNA) extracted from plant tissues and generated by reverse transcription. However, some CDS are difficult to acquire through this process as they are expressed at extremely low levels or have specific spatial and/or temporal expression patterns in vivo. These challenges require the development of alternative CDS cloning technologies. In this study, we found that the genomic intron-containing gene coding sequences (gDNA) from Arabidopsis thaliana, Oryza sativa, Brassica napus, and Glycine max can be correctly transcribed and spliced into mRNA in Nicotiana benthamiana. In contrast, gDNAs from Triticum aestivum and Sorghum bicolor did not function correctly. In transient expression experiments, the target DNA sequence is driven by a constitutive promoter. Theoretically, a sufficient amount of mRNA can be extracted from the N. benthamiana leaves, making it conducive to the cloning of CDS target genes. Our data demonstrate that N. benthamiana can be used as an effective host for the cloning CDS of plant genes.
文摘In this article, using generalized weighted mean and difference matrix of order m, we introduce the paranormed sequence space l(u, v, p; △(m)), which consist of the sequences whose generalized weighted △(m)-difference means are in the linear space l(p) defined by I.J.Maddox. Also, we determine the basis of this space and compute its α-, β- and γ-duals. Further, we give the characterization of the classes of matrix mappings from l(u, v, p, △(m)) to l∞, c, and co. Finally, we apply the Hausdorff measure of noncompacness to characterize some classes of compact operators given by matrices on the space lp(U, v, △(m)) (1 ≤ p 〈 ∞).
基金supported by the National Key Research and Development Program of China(2016YFB0800601)the Natural Science Foundation of China(61303217+3 种基金61502372)the Fundamental Research Funds for the Central Universities(JB140115)the Natural Science Foundation of Shaanxi Province(2013JQ80022014JQ8313)
文摘Cyclotomic sequences have good cryptographic properties and are closely related to difference sets.This paper proposes a new class of binary generalized cyclotomic sequences of order two and length pqr.Its linear complexity,minimal polynomial,and autocorrelation are investigated.The results show that these sequences have a large linear complexity when 2∈D1,which means they can resist the Berlekamp-Massey attack.Furthermore,the autocorrelation values are close to 0 with a probability of approximately 1?1/r.Therefore,when r is a big prime,the new sequence has a good autocorrelation.
基金Supported by the National Natural Science Foundation(NNSF)of China(No.11171150)Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-13-001)+1 种基金Funding of Jiangsu Innovation Program for Graduate Education(CXLX13-127,Fundamental Research Funds for the Central Universities)Funding for Outstanding Doctoral Dissertation in NUAA(BCXJ-13-17)
文摘Let p =ef +1 be an odd prime with positive integers e and f. In this paper, we calculate the values of Gauss periods of order e =3, 4, 6 over a finite field GF(q), where q is a prime with q≠p. As applications, several cyclotomic sequences of order e =3, 4, 6 are employed to construct a number of classes of cyclic codes over GF(q) with prime length. Under certain conditions, the linear complexity and reciprocal minimal polynomials of cyclotomic sequences are calculated, and the lower bounds on the minimum distances of these cyclic codes are obtained.
基金This work was supported by the National Key Research and Development Program of China(grant no.2022YFF1000500)National Natural Science Foundation of China(grant no.31941007)Zhejiang province agriculture(livestock)varieties breeding Key Technology R&D Program(grant no.2016C02054-2).
文摘Background The reliance on a solitary linear reference genome has imposed a significant constraint on our compre-hensive understanding of genetic variation in animals.This constraint is particularly pronounced for non-reference sequences(NRSs),which have not been extensively studied.Results In this study,we constructed a pig pangenome graph using 21 pig assemblies and identified 23,831 NRSs with a total length of 105 Mb.Our findings revealed that NRSs were more prevalent in breeds exhibiting greater genetic divergence from the reference genome.Furthermore,we observed that NRSs were rarely found within coding sequences,while NRS insertions were enriched in immune-related Gene Ontology terms.Notably,our investigation also unveiled a close association between novel genes and the immune capacity of pigs.We observed substantial differences in terms of frequencies of NRSs between Eastern and Western pigs,and the heat-resistant pigs exhibited a substantial number of NRS insertions in an 11.6 Mb interval on chromosome X.Additionally,we discovered a 665 bp insertion in the fourth intron of the TNFRSF19 gene that may be associated with the ability of heat tolerance in South-ern Chinese pigs.Conclusions Our findings demonstrate the potential of a graph genome approach to reveal important functional features of NRSs in pig populations.
文摘Objective:To address the phylogenetic and phylogeographic relationship between different lineages of Anopheles(An.)subpictus species complex in most parts of the Asian continent by maximum utilization of Internal Transcriber Spacer 2(ITS2)and cytochrome C oxidase I(COI)sequences deposited at the GenBank.Methods:Seventy-five ITS2,210 COI and 26 concatenated sequences available in the NCBI database were used.Phylogenetic analysis was performed using Bayesian likelihood trees,whereas median-joining haplotype networks and time-scale divergence trees were generated for phylogeographic analysis.Genetic diversity indices and genetic differentiation were also calculated.Results:Two genetically divergent molecular forms of An.subpictus species complex corresponding to sibling species A and B are established.Species A evolved around 37-82 million years ago in Sri Lanka,India,and the Netherlands,and species B evolved around 22-79 million years ago in Sri Lanka,India,and Myanmar.Vietnam,Thailand,and Cambodia have two molecular forms:one is phylogenetically similar to species B.Other forms differ from species A and B and evolved recently in the above mentioned countries,Indonesia and the Philippines.Genetic subdivision among Sri Lanka,India,and the Netherlands is almost absent.A substantial genetic differentiation was obtained for some populations due to isolation by large geographical distances.Genetic diversity indices reveal the presence of a long-established stable mosquito population,at mutation-drift equilibrium,regardless of population fluctuations.Conclusions:An.subpictus species complex consists of more than two genetically divergent molecular forms.Species A is highly divergent from the rest.Sri Lanka and India contain only species A and B.
文摘In the present paper,we mostly focus on P_(p)^(2)-statistical convergence.We will look into the uniform integrability via the power series method and its characterizations for double sequences.Also,the notions of P_(p)^(2)-statistically Cauchy sequence,P_(p)^(2)-statistical boundedness and core for double sequences will be described in addition to these findings.
基金key project carried out in 2008-2011financially supported by the National Major Special Science and Technology Project (Grant No. 2008ZX05004-001)Major Special Issue of the China National Petroleum Corporation (Grant No. 2008E-0702)
文摘Type division and controlling factor analysis of 3rd-order sequence are of practical significance to tec-tonic analysis, sedimentary environment identification, and other geological researches. Based on the comprehensive analysis of carbon and oxygen isotope trends, paleobathymetry and spectral-frequency of representative well logs, 3rd-order sequences can be divided into 3 types: (a) global sea level (GSL) sequence mainly controlled by GSL change;(b) tectonic sequence mainly controlled by regional tectonic activity;and (c) composite sequence jointly controlled by GSL change and regional tectonic activity. This study aims to identify the controlling factors of 3rd-order sequences and to illustrate a new method for classification of 3rd-order sequences of the middle Permian strata in the Sichuan Basin, China. The middle Permian strata in the Sichuan Basin consist of 3 basin-contrastive 3rd-order sequences, i.e., PSQ1, PSQ2 and PSQ3. Of these, PSQ1 is a GSL sequence while PSQ2 and PSQ3 are composite sequences. The results suggest that the depositional environment was stable during the deposition of PSQ1, but was activated by tectonic activity during the deposition of the middle Permian Maokou Formation.
基金supported by National Natural Science Foundation of China(Grant No.62073256)the Shaanxi Provincial Science and Technology Department(Grant No.2023-YBGY-342).
文摘To solve the problem of target damage assessment when fragments attack target under uncertain projectile and target intersection in an air defense intercept,this paper proposes a method for calculating target damage probability leveraging spatio-temporal finite multilayer fragments distribution and the target damage assessment algorithm based on cloud model theory.Drawing on the spatial dispersion characteristics of fragments of projectile proximity explosion,we divide into a finite number of fragments distribution planes based on the time series in space,set up a fragment layer dispersion model grounded in the time series and intersection criterion for determining the effective penetration of each layer of fragments into the target.Building on the precondition that the multilayer fragments of the time series effectively assail the target,we also establish the damage criterion of the perforation and penetration damage and deduce the damage probability calculation model.Taking the damage probability of the fragment layer in the spatio-temporal sequence to the target as the input state variable,we introduce cloud model theory to research the target damage assessment method.Combining the equivalent simulation experiment,the scientific and rational nature of the proposed method were validated through quantitative calculations and comparative analysis.
文摘The present study is devoted to understanding the evolution of the Upper Jurassic Sab'atayn Formation in the Marib-Shabwa Basin,Yemen,through a sequence stratigraphic analysis based on integrating datasets of sedimentology,seismic sections,and well logs.The Sab'atayn Formation(Tithonian age)is represented by a series of clastic and evaporites that were deposited under fluvio-deltaic to prodeltaic settings.It is divided into four members including Yah(at the base),upwards to Seen,Alif,and Safir at the top.Two third-order depositional sequences were determined for the Tithonian succession which were separated by three sequence boundaries.These sequences were classified into their systems tracts signifying several sedimentation patterns of progradational,aggradational,and retrogradational parasequence sets.The first depositional sequence corresponds to the early-middle Tithonian Yah and Seen units that can be classified into lowstand,transgressive,and highstand systems tracts.The second sequence comprises the late Tithonian Alif unit that can be subdivided into transgressive and highstand systems tracts.The sandy deposits of the Alif Member(highstand deposits)represent the most productive hydrocarbon reservoir in the basin.The Upper Jurassic sediments in the study area were resulted from a combination of eustatic and tectonic effects.
基金The study was financially supported by Projects from Shaanxi Province(2021LLRH-07-03-01 and 2023-ZDLNY-07)Yangling Seed Industry Innovation(YLzy-yc2021-01).The funders had no role in study design,data collection and analysis,decision to publish,or preparation of the manuscript.
文摘Genetic manipulation(either restraint or enhancement)of the biosynthesis pathway ofα-linolenic acid(ALA)in seed oil is an important goal in Brassica napus breeding.B.napus is a tetraploid plant whose genome often har-bors four and six homologous copies,respectively,of the two fatty acid desaturases FAD2 and FAD3,which con-trol the last two steps of ALA biosynthesis during seed oil accumulation.In this study,we compared their promoters,coding sequences,and expression levels in three high-ALA inbred lines 2006L,R8Q10,and YH25005,a low-ALA line A28,a low-ALA/high-oleic-acid accession SW,and the wildtype ZS11.The expression levels of most FAD2 and FAD3 homologs in the three high-ALA accessions were higher than those in ZS11 and much higher than those in A28 and SW.The three high-ALA accessions shared similar sequences with the pro-moters and CDSs of BnFAD3.C4 and BnFAD3.A3.In A28 and SW,substitution of three amino acid residues in BnFAD2.A5 and BnFAD2.C5,an absence of BnFAD2.C1 locus,and a 549 bp long deletion on the BnFAD3.A3 promoter were detected.The profile of BnFAD2 mutation in the two low-ALA accessions A28 and SW is different from that reported in previous studies.The mutations in BnFAD3 in the high-ALA accessions are reported for thefirst time.In identifying the sites of these mutations,we provide detailed information to aid the design of mole-cular markers for accelerated breeding schemes.
基金supported by the Yayasan Universiti Teknologi PETRONAS Grants,YUTP-PRG(015PBC-027)YUTP-FRG(015LC0-311),Hilmi Hasan,www.utp.edu.my.
文摘Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all while upholding image quality.Moreover,an increasing number of hospitals are embracing cloud computing for patient data storage,necessitating meticulous scrutiny of server security and privacy protocols.Nevertheless,considering the widespread availability of multimedia tools,the preservation of digital data integrity surpasses the significance of compression alone.In response to this concern,we propose a secure storage and transmission solution for compressed medical image sequences,such as ultrasound images,utilizing a motion vector watermarking scheme.The watermark is generated employing an error-correcting code known as Bose-Chaudhuri-Hocquenghem(BCH)and is subsequently embedded into the compressed sequence via block-based motion vectors.In the process of watermark embedding,motion vectors are selected based on their magnitude and phase angle.When embedding watermarks,no specific spatial area,such as a region of interest(ROI),is used in the images.The embedding of watermark bits is dependent on motion vectors.Although reversible watermarking allows the restoration of the original image sequences,we use the irreversible watermarking method.The reason for this is that the use of reversible watermarks may impede the claims of ownership and legal rights.The restoration of original data or images may call into question ownership or other legal claims.The peak signal-to-noise ratio(PSNR)and structural similarity index(SSIM)serve as metrics for evaluating the watermarked image quality.Across all images,the PSNR value exceeds 46 dB,and the SSIM value exceeds 0.92.Experimental results substantiate the efficacy of the proposed technique in preserving data integrity.
基金funded by the Sichuan Science and Technology Program (grant number 2022NSFSC1176)the open Fund for National Key Laboratory of Geological Disaster Prevention and Environmental Protection (grant number SKLGP2022K027)the State Key Laboratory of Geohazard Prevention and Geoenvironment Protection Independent Research Project (SKLGP2022Z001)。
文摘Repetitive mining beneath bedding slopes is identified as a critical factor in geomorphic disturbances, especially landslides and surface subsidence. Prior research has largely concentrated on surface deformation in plains due to multi-seam coal mining and the instability of natural bedding slopes, yet the cumulative impact of different mining sequences on bedding slopes has been less explored. This study combines drone surveys and geological data to construct a comprehensive three-dimensional model of bedding slopes. Utilizing FLAC3D and PFC2D models, derived from laboratory experiments, it simulates stress, deformation, and failure dynamics of slopes under various mining sequences. Incorporating fractal dimension analysis, the research evaluates the stability of slopes in relation to different mining sequences. The findings reveal that mining in an upslope direction minimizes disruption to overlying strata. Initiating extraction from lower segments increases tensile-shear stress in coal pillar overburdens, resulting in greater creep deformation towards the downslope than when starting from upper segments, potentially leading to localized landslides and widespread creep deformation in mined-out areas. The downslope upward mining sequence exhibits the least fractal dimensions, indicating minimal disturbance to both strata and surface. While all five mining scenarios maintain good slope stability under normal conditions, recalibrated stability assessments based on fractal dimensions suggest that downslope upward mining offers the highest stability under rainfall, contrasting with the lower stability and potential instability risks of upslope downward mining. These insights are pivotal for mining operations and geological hazard mitigation in multi-seam coal exploitation on bedding slopes.