With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy...With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency.展开更多
As a key measure to comprehensively promote the strategy of rural revitalization,especially in the field of industrial prosperity,the integration of rural three industries is of great strategic significance.In this st...As a key measure to comprehensively promote the strategy of rural revitalization,especially in the field of industrial prosperity,the integration of rural three industries is of great strategic significance.In this study,entropy method and TOPSIS method were employed to calculate the comprehensive evaluation index of integration of three industries and the ideal development value respectively.The development status of integration of three rural industries was systematically evaluated,and the development trend of different regions was compared and analyzed.The results indicate that the development index of integration of three industries showed a steady growth trend,among which the development level of Jiangsu Province ranked first,followed by Hubei Province,while the development level of Shaanxi Province was relatively low.When analyzing the Level I indicators of integration of three rural industries,the contribution of industrial integration behavior exceeded the performance of industrial integration.Among the behavioral indicators of industrial integration,the weight of agricultural multi-functionality and service integration was relatively large,which plays a significant role in promoting the development of integration of three rural industries.The scores and growth rates of Jiangsu Province in increasing farmers income,increasing agricultural production and rural economic development were higher than those of other regions,while Shaanxi Province still had a certain gap in rural industrial integration indicators compared with Jiangsu Province and Hubei Province.In view of this,we came up with some strategic recommendations for further promoting the development of integration of three rural industries.展开更多
With the rapid development of the times,the continuous innovation of teaching concepts,and the deficiency of the traditional computer teaching mode,the rapid development of computer technology has put forward higher r...With the rapid development of the times,the continuous innovation of teaching concepts,and the deficiency of the traditional computer teaching mode,the rapid development of computer technology has put forward higher requirements of the teaching mode,so it is imperative to carry on the innovation of teaching mode for computer majors.Combined with the development needs of computer technology in today’s society,this paper combs the shortcomings of the existing teaching mode.Under the background of the integration of industry and education,this paper puts forward the tripartite cooperation mode with students as the core,schools as the bridge,and enterprises as the support,and establishes a new mechanism of the teaching mode of computer majors under the background of the integration of industry and education.This way of learning theory on campus and practicing in society will supplement and strengthen students’professional ability needs in the environment of the rapid development of computers in the future.展开更多
This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the im...This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”展开更多
BACKGROUND Addressing the growing challenge of hospitalizing chronic multimorbid patients,this study examines the strain these conditions impose on healthcare systems at a local level,focusing on a pilot program.Chron...BACKGROUND Addressing the growing challenge of hospitalizing chronic multimorbid patients,this study examines the strain these conditions impose on healthcare systems at a local level,focusing on a pilot program.Chronic diseases and complex patients require comprehensive management strategies to reduce healthcare burdens and improve patient outcomes.If proven effective,this pilot model has the potential to be replicated in other healthcare settings to enhance the management of chronic multimorbid patients.AIM To evaluate the effectiveness of the high complexity unit(HCU)in managing chronic multimorbid patients through a multidisciplinary care model and to compare it with standard hospital care.METHODS The study employed a descriptive longitudinal approach,analyzing data from the Basic Minimum Data Set(BMDS)to compare hospitalization variables among the HCU,the Internal Medicine Service,and other services at Antequera Hospital throughout 2022.The HCU,designed for patients with complex chronic conditions,integrates a patient-centered model emphasizing multidisciplinary care and continuity post-discharge.RESULTS The study employed a descriptive longitudinal approach,analyzing data from the BMDS to compare hospitalization variables among the HCU,the Internal Medicine Service,and other services at Antequera Hospital throughout 2022.The HCU,designed for patients with complex chronic conditions,integrates a patient-centered model emphasizing multidisciplinary care and continuity post-discharge.CONCLUSION This study demonstrates the effectiveness of the HCU in managing patients with complex chronic diseases through a multidisciplinary approach.The coordinated care provided by the HCU results in improved patient outcomes,reduced unnecessary hospitalizations,and better management of patient complexity.The superiority of the HCU compared to standard care is evident in key outcomes such as fewer readmissions and higher patient satisfaction,reinforcing its value as a model of care to be replicated.展开更多
BACKGROUND Patients with BRAF V600E mutant metastatic colorectal cancer(mCRC)have a low incidence rate,poor biological activity,suboptimal response to conventional treatments,and a poor prognosis.In the previous cohor...BACKGROUND Patients with BRAF V600E mutant metastatic colorectal cancer(mCRC)have a low incidence rate,poor biological activity,suboptimal response to conventional treatments,and a poor prognosis.In the previous cohort study on mCRC conducted by our team,it was observed that integrated Chinese and Western medicine treatment could significantly prolong the overall survival(OS)of patients with colorectal cancer.Therefore,we further explored the survival benefits in the population with BRAF V600E mutant mCRC.AIM To evaluate the efficacy of integrated Chinese and Western medicine in the treatment of BRAF V600E mutant metastatic colorectal cancer.METHODS A cohort study was conducted on patients with BRAF V600E mutant metastatic colorectal cancer admitted to Xiyuan Hospital of China Academy of Chinese Medical Sciences and Traditional Chinese Medicine Hospital of Xinjiang Uygur Autonomous Region from January 2016 to December 2022.The patients were divided into two cohorts.RESULTS A total of 34 cases were included,with 23 in Chinese-Western medicine cohort(cohort A)and 11 in Western medicine cohort(cohort B).The median overall survival was 19.9 months in cohort A and 14.2 months in cohort B,with a statistically significant difference(P=0.038,hazard ratio=0.46).The 1-3-year survival rates were 95.65%(22/23),39.13%(9/23),and 26.09%(6/23)in cohort A,and 63.64%(7/11),18.18%(2/11),and 9.09%(1/11)in cohort B,respectively.Subgroup analysis showed statistically significant differences in median OS between the two cohorts in the right colon,liver metastasis,chemotherapy,and first-line treatment subgroups(P<0.05).CONCLUSION Integrated Chinese and Western medicine can prolong the survival and reduce the risk of death in patients with BRAF V600E mutant metastatic colorectal cancer,with more pronounced benefits observed in patients with right colon involvement,liver metastasis,combined chemotherapy,and first-line treatment.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary a...Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use.展开更多
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.展开更多
The application of fungicides is an effective strategy for controlling plant diseases.Among these agents,plant-derived antifungal metabolites are particularly promising due to their eco-friendly and sustainable nature...The application of fungicides is an effective strategy for controlling plant diseases.Among these agents,plant-derived antifungal metabolites are particularly promising due to their eco-friendly and sustainable nature.Plant secondary metabolites typically exhibit broad-spectrum antifungal activity without selective toxicity against pathogens.However,only a small fraction of antifungal metabolites have been identified from the tens of thousands of known plant secondary metabolites.In this study,we conducted a metabolomic analysis on both blast-resistant(Digu)and-susceptible(Lijiangxintuanheigu)rice varieties to uncover novel metabolites that enhance blast resistance.We found that 24 and 48 h post-inoculation with Magnaporthe oryzae were critical time points for metabolomic profiling,based on the infected status of M.oryzae in rice and the observed differences in shikimate accumulation between the two varieties.Following metabolomic analysis,we identified nine flavonoids that were differentially accumulated and are considered potential candidates for disease control.Among these,apigenin-7-glucoside,rhamnetin,and spireoside were found to be effective in controlling blast disease,with spireoside demonstrating the most pronounced efficacy.We discovered that spireoside controlled blast disease by inhibiting both spore germination and appressorium formation in M.oryzae,primarily through disrupting cell membrane integrity.However,spireoside did not induce rice immunity.Furthermore,spireoside was also effective in controlling sheath blight disease.Thus,spireoside shows considerable promise as a candidate for the development of a fungicide for controlling plant diseases.展开更多
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which ...The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.展开更多
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t...The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.展开更多
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and sm...Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral characteristics.Behavioral characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in practice.However,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate authentication.Thus,we review the literature on the use of AI in physiological characteristics recognition pub-lished after 2015.We use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their limitations.We also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.展开更多
The rapid pace of economic globalization has presented both unprecedented opportunities and challenges for the construction industry.Management accounting and financial accounting,as integral components of enterprise ...The rapid pace of economic globalization has presented both unprecedented opportunities and challenges for the construction industry.Management accounting and financial accounting,as integral components of enterprise management,play indispensable roles in the development of construction companies.While both disciplines possess distinct characteristics,the evolving business landscape necessitates a more integrated approach.By combining the strengths and values of both,construction companies can gain valuable insights and make informed decisions.This paper delves into the concepts of management accounting and financial accounting,explores the feasibility of their integration within construction companies,and provides recommendations for implementation to foster sustainable development.The insights and strategies presented in this paper can serve as a valuable reference for other construction companies seeking to optimize their management and operations.展开更多
The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a re...The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a result,research on network analysis has become vital.Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods.In this paper,we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework.The results indicate that using the proposed ensemble techniques improves accuracy by up to 1.7%compared to single-algorithm approaches.These results also suggest that the proposed framework can flexibly adapt to general IoT network analysis scenarios.Unlike existing frameworks,which only exhibit high performance in specific situations,the proposed framework can serve as a fundamental approach for addressing a wide range of issues.展开更多
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus...Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures.展开更多
Pleurostomatid ciliates,as a highly diverse and widely distributed unicellular eukaryote group,play a crucial role in the cycling of nutrients and energy in microbial food webs.However,research on pleurostomatids rema...Pleurostomatid ciliates,as a highly diverse and widely distributed unicellular eukaryote group,play a crucial role in the cycling of nutrients and energy in microbial food webs.However,research on pleurostomatids remains insufficient,resulting in a paucity of molecular information and substantial gaps in knowledge of their phylogenetic relationships.In recent years,we investigated pleurostomatid diversity in various Chinese habitats,including their systematic relationships and taxonomic circumscriptions,which were comprehensively analyzed using an integrative morphomolecular approach.Results revealed that:(1)pleurostomatids can be categorized into two suborders,Protolitonotina subord.nov.and Amphileptina Jankowski,1967;(2)Protolitonotina subord.nov.represents the ancestral pleurostomatid group and includes two genera,Protolitonotus and Heterolitonotus gen.nov.,characterized by right kineties progressively shortened along rightmost full kineties and absence of a left dorsolateral kinety;(3)Heterolitonotus gen.nov.represents an orphan lineage and is defined by an oral slit extending to its dorsal margin;(4)“Protolitonotus clampi”does not group with congeners but instead represents an orphan lineage,thus Novilitonotus gen.nov.is established to which P.clampi is transferred as Novilitonotus clampi comb.nov.;(5)three new species,Apoamphileptus paraclaparedii sp.nov.,Heterolitonotus rex gen.nov.,sp.nov.,and Loxophyllum apohelus sp.nov.,are described;and(6)helices 21es6a to 21es6d within the V4 region of small subunit ribosomal RNA(SSU rRNA)may serve as a useful tool for discriminating pleurostomatids.The evolutionary relationships among all main lineages of pleurostomatids are discussed and a key to the identification of pleurostomatid genera is provided.展开更多
We study the closed range property and the strict singularity of integration operators acting on the spaces F(p,pα-2,s).We completely characterize the closed range property of the Volterra companion operator I_(g)on ...We study the closed range property and the strict singularity of integration operators acting on the spaces F(p,pα-2,s).We completely characterize the closed range property of the Volterra companion operator I_(g)on F(p,pα-2,s),which generalizes the existing results and answers a question raised in[A.Anderson,Integral Equations Operator Theory,69(2011),no.1,87-99].For the Volterra operator J_(g),we show that,for 0<α≤1,J_(g)never has a closed range on F(p,pα-2,s).We then prove that the notions of compactness,weak compactness and strict singularity coincide in the case of J_(g)acting on F(p,p-2,s).展开更多
During Chinese New Year holiday,characteristic folk customs activities significantly stimulated local tourism consumption potential and the high-quality development of tourism economy by integrating,leading and empowe...During Chinese New Year holiday,characteristic folk customs activities significantly stimulated local tourism consumption potential and the high-quality development of tourism economy by integrating,leading and empowering local tourism projects.展开更多
基金supported by National Natural Science Foundation of China under grant No.62271125,No.62273071Sichuan Science and Technology Program(No.2022YFG0038,No.2021YFG0018)+1 种基金by Xinjiang Science and Technology Program(No.2022273061)by the Fundamental Research Funds for the Central Universities(No.ZYGX2020ZB034,No.ZYGX2021J019).
文摘With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency.
基金Supported by Western Project of National Social Science Fund of China(23XJY013)Project of Social Science Foundation of Shaanxi Province(2022D032)。
文摘As a key measure to comprehensively promote the strategy of rural revitalization,especially in the field of industrial prosperity,the integration of rural three industries is of great strategic significance.In this study,entropy method and TOPSIS method were employed to calculate the comprehensive evaluation index of integration of three industries and the ideal development value respectively.The development status of integration of three rural industries was systematically evaluated,and the development trend of different regions was compared and analyzed.The results indicate that the development index of integration of three industries showed a steady growth trend,among which the development level of Jiangsu Province ranked first,followed by Hubei Province,while the development level of Shaanxi Province was relatively low.When analyzing the Level I indicators of integration of three rural industries,the contribution of industrial integration behavior exceeded the performance of industrial integration.Among the behavioral indicators of industrial integration,the weight of agricultural multi-functionality and service integration was relatively large,which plays a significant role in promoting the development of integration of three rural industries.The scores and growth rates of Jiangsu Province in increasing farmers income,increasing agricultural production and rural economic development were higher than those of other regions,while Shaanxi Province still had a certain gap in rural industrial integration indicators compared with Jiangsu Province and Hubei Province.In view of this,we came up with some strategic recommendations for further promoting the development of integration of three rural industries.
文摘With the rapid development of the times,the continuous innovation of teaching concepts,and the deficiency of the traditional computer teaching mode,the rapid development of computer technology has put forward higher requirements of the teaching mode,so it is imperative to carry on the innovation of teaching mode for computer majors.Combined with the development needs of computer technology in today’s society,this paper combs the shortcomings of the existing teaching mode.Under the background of the integration of industry and education,this paper puts forward the tripartite cooperation mode with students as the core,schools as the bridge,and enterprises as the support,and establishes a new mechanism of the teaching mode of computer majors under the background of the integration of industry and education.This way of learning theory on campus and practicing in society will supplement and strengthen students’professional ability needs in the environment of the rapid development of computers in the future.
基金2021 Tianjin Educational Science Planning Project“Research and Practice of Talent Cultivation Mode for IoT Majors in Higher Vocational Colleges under the Guidance of the‘1+X’Certificate System”(CJE210237)。
文摘This article explores the development of the Internet of Things(IoT)application technology course in higher vocational colleges under the background of“post,course,competition,certificate.”It first emphasizes the importance of IoT talent training and course construction in higher vocational colleges and deeply analyzes the core concept of“post,course,competition,certificate”integration.In view of the problems faced in the course construction of IoT application technology in higher vocational colleges and the practical experience of Tianjin Vocational College of Mechanics and Electricity,the implementation strategy of the course construction of IoT application technology in higher vocational colleges is elaborated in detail based on the integrated concept of“post,course,competition,certificate.”
基金Supported by Fundación Progreso y Salud,No.AP-0306-2022-C3-F2.
文摘BACKGROUND Addressing the growing challenge of hospitalizing chronic multimorbid patients,this study examines the strain these conditions impose on healthcare systems at a local level,focusing on a pilot program.Chronic diseases and complex patients require comprehensive management strategies to reduce healthcare burdens and improve patient outcomes.If proven effective,this pilot model has the potential to be replicated in other healthcare settings to enhance the management of chronic multimorbid patients.AIM To evaluate the effectiveness of the high complexity unit(HCU)in managing chronic multimorbid patients through a multidisciplinary care model and to compare it with standard hospital care.METHODS The study employed a descriptive longitudinal approach,analyzing data from the Basic Minimum Data Set(BMDS)to compare hospitalization variables among the HCU,the Internal Medicine Service,and other services at Antequera Hospital throughout 2022.The HCU,designed for patients with complex chronic conditions,integrates a patient-centered model emphasizing multidisciplinary care and continuity post-discharge.RESULTS The study employed a descriptive longitudinal approach,analyzing data from the BMDS to compare hospitalization variables among the HCU,the Internal Medicine Service,and other services at Antequera Hospital throughout 2022.The HCU,designed for patients with complex chronic conditions,integrates a patient-centered model emphasizing multidisciplinary care and continuity post-discharge.CONCLUSION This study demonstrates the effectiveness of the HCU in managing patients with complex chronic diseases through a multidisciplinary approach.The coordinated care provided by the HCU results in improved patient outcomes,reduced unnecessary hospitalizations,and better management of patient complexity.The superiority of the HCU compared to standard care is evident in key outcomes such as fewer readmissions and higher patient satisfaction,reinforcing its value as a model of care to be replicated.
基金Supported by National Natural Science Foundation of China,No.82174461Hospital Capability Enhancement Project of Xiyuan Hospital,CACMS,No.XYZX0201-22Technology Innovation Project of China Academy of Chinese Medical Sciences,No.CI2021A01811.
文摘BACKGROUND Patients with BRAF V600E mutant metastatic colorectal cancer(mCRC)have a low incidence rate,poor biological activity,suboptimal response to conventional treatments,and a poor prognosis.In the previous cohort study on mCRC conducted by our team,it was observed that integrated Chinese and Western medicine treatment could significantly prolong the overall survival(OS)of patients with colorectal cancer.Therefore,we further explored the survival benefits in the population with BRAF V600E mutant mCRC.AIM To evaluate the efficacy of integrated Chinese and Western medicine in the treatment of BRAF V600E mutant metastatic colorectal cancer.METHODS A cohort study was conducted on patients with BRAF V600E mutant metastatic colorectal cancer admitted to Xiyuan Hospital of China Academy of Chinese Medical Sciences and Traditional Chinese Medicine Hospital of Xinjiang Uygur Autonomous Region from January 2016 to December 2022.The patients were divided into two cohorts.RESULTS A total of 34 cases were included,with 23 in Chinese-Western medicine cohort(cohort A)and 11 in Western medicine cohort(cohort B).The median overall survival was 19.9 months in cohort A and 14.2 months in cohort B,with a statistically significant difference(P=0.038,hazard ratio=0.46).The 1-3-year survival rates were 95.65%(22/23),39.13%(9/23),and 26.09%(6/23)in cohort A,and 63.64%(7/11),18.18%(2/11),and 9.09%(1/11)in cohort B,respectively.Subgroup analysis showed statistically significant differences in median OS between the two cohorts in the right colon,liver metastasis,chemotherapy,and first-line treatment subgroups(P<0.05).CONCLUSION Integrated Chinese and Western medicine can prolong the survival and reduce the risk of death in patients with BRAF V600E mutant metastatic colorectal cancer,with more pronounced benefits observed in patients with right colon involvement,liver metastasis,combined chemotherapy,and first-line treatment.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
基金supported by the National Natural Science Foundation of China(Grant No.82270892)Natural Science Foundation of Hubei Province(Grant No.2022CFB287)+2 种基金Xianning City Science and Technology Plan Project(Grant No.2022ZRKX052)School projects of Hubei University of Science and Technology(Grant No.2022T01,2021WG05,2021TNB01)Hubei University of Science and Technology School-level Fund(Grant No.BK202122).
文摘Background:Diabetic cardiomyopathy(DCM)is a type of cardiomyopathy caused by long-term diabetes,characterized by abnormal myocardial structure and function,which can lead to heart failure.Berberine(BBR),a quaternary ammonium alkaloid isolated from Coptidis Rhizoma,a traditional Chinese medicine,has superior anti-diabetic and heart-protective properties.The purpose of this study is to assess the impact of BBR on DCM.Methods:This study used a systems pharmacology approach to evaluate the related proteins and signalling pathways between BBR and DCM targets,combined with experimental validation using diabetic mouse heart sections.Microstructural and pathological changes were observed using Hematoxylin-eosin,Masson’s trichrome stain and wheat germ agglutinin staining.Immunofluorescence and western blot were used to determine protein expression.Results:The results indicate that BBR and DCM share 21 core relevant targets,with cross-targets predominantly located in mitochondrial,endoplasmic reticulum,and plasma membrane components.BBR exerts its main effects in improving DCM by maintaining mitochondrial integrity,particularly involving the PI3K-AKT-GSK3βand apoptosis signalling pathways.In addition,post-treatment changes in the key targets of BBR,including cysteine aspartate specific protease(Caspase)-3,phosphoinositide 3-kinase(PI3K)and mitochondria-related proteins,are suggestive of its efficacy.Conclusion:BBR crucially improves DCM by maintaining mitochondrial integrity,inhibiting apoptosis,and modulating PI3K-AKT-GSK3βsignaling.Further studies must address animal model limitations and validate clinical efficacy to understand BBR’s mechanisms fully and its potential clinical use.
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
文摘Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
基金supported by the National Natural Science Foundation of China(Grant Nos.32172419,32372555,32121003,32425005,32072407,and 32272033)the National Key Research and Development Program of China(Grant No.2021YFA1300702)the Sichuan Science and Technology Program,China(Grant Nos.2023NSFSC0005,2023NSFSC1996,2024NSFSC0322,2024YFNH0014,2022NSFSC1755,2022-NSFSC1650,2022NSFSC0156,and 2022NSFSC0166).
文摘The application of fungicides is an effective strategy for controlling plant diseases.Among these agents,plant-derived antifungal metabolites are particularly promising due to their eco-friendly and sustainable nature.Plant secondary metabolites typically exhibit broad-spectrum antifungal activity without selective toxicity against pathogens.However,only a small fraction of antifungal metabolites have been identified from the tens of thousands of known plant secondary metabolites.In this study,we conducted a metabolomic analysis on both blast-resistant(Digu)and-susceptible(Lijiangxintuanheigu)rice varieties to uncover novel metabolites that enhance blast resistance.We found that 24 and 48 h post-inoculation with Magnaporthe oryzae were critical time points for metabolomic profiling,based on the infected status of M.oryzae in rice and the observed differences in shikimate accumulation between the two varieties.Following metabolomic analysis,we identified nine flavonoids that were differentially accumulated and are considered potential candidates for disease control.Among these,apigenin-7-glucoside,rhamnetin,and spireoside were found to be effective in controlling blast disease,with spireoside demonstrating the most pronounced efficacy.We discovered that spireoside controlled blast disease by inhibiting both spore germination and appressorium formation in M.oryzae,primarily through disrupting cell membrane integrity.However,spireoside did not induce rice immunity.Furthermore,spireoside was also effective in controlling sheath blight disease.Thus,spireoside shows considerable promise as a candidate for the development of a fungicide for controlling plant diseases.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61872289 and 62172266in part by the Henan Key Laboratory of Network Cryptography Technology LNCT2020-A07the Guangxi Key Laboratory of Trusted Software under Grant No.KX202308.
文摘The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical field.It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart healthcare.However,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be frequent.Fortunately,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue above.Nevertheless,most existing SE schemes cannot solve the vector dominance threshold problem.In response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this study.We use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold t.Then,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
基金supported by the National Natural Science Foundation of China(62072392)the National Natural Science Foundation of China(61972360)the Major Scientific and Technological Innovation Projects of Shandong Province(2019522Y020131).
文摘The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.
基金funded in part by the National Natural Science Foundation of China under Grant No.61872038in part by the Fundamental Research Funds for the Central Universities under Grant No.FRF-GF-20-15B.
文摘Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)systems.However,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral characteristics.Behavioral characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in practice.However,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate authentication.Thus,we review the literature on the use of AI in physiological characteristics recognition pub-lished after 2015.We use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their limitations.We also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
文摘The rapid pace of economic globalization has presented both unprecedented opportunities and challenges for the construction industry.Management accounting and financial accounting,as integral components of enterprise management,play indispensable roles in the development of construction companies.While both disciplines possess distinct characteristics,the evolving business landscape necessitates a more integrated approach.By combining the strengths and values of both,construction companies can gain valuable insights and make informed decisions.This paper delves into the concepts of management accounting and financial accounting,explores the feasibility of their integration within construction companies,and provides recommendations for implementation to foster sustainable development.The insights and strategies presented in this paper can serve as a valuable reference for other construction companies seeking to optimize their management and operations.
基金supported by Innovative Human Resource Development for Local Intellectualization program through the Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(IITP2024-00156287,50%)funded by the Institute for Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2022-0-01203,Regional Strategic Industry Convergence Security Core Talent Training Business,50%).
文摘The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various sectors.Nevertheless,this advancement has also resulted in a notable surge in cyberattacks,notably botnets.As a result,research on network analysis has become vital.Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods.In this paper,we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework.The results indicate that using the proposed ensemble techniques improves accuracy by up to 1.7%compared to single-algorithm approaches.These results also suggest that the proposed framework can flexibly adapt to general IoT network analysis scenarios.Unlike existing frameworks,which only exhibit high performance in specific situations,the proposed framework can serve as a fundamental approach for addressing a wide range of issues.
基金Ministry of Higher Education of Malaysia under theResearch GrantLRGS/1/2019/UKM-UKM/5/2 and Princess Nourah bint Abdulrahman University for financing this researcher through Supporting Project Number(PNURSP2024R235),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures.
基金supported by the National Natural Science Foundation of China(32030015,32170533)Researchers Supporting Project Number(RSP2024R10)King Saud University,Riyadh,Saudi Arabia。
文摘Pleurostomatid ciliates,as a highly diverse and widely distributed unicellular eukaryote group,play a crucial role in the cycling of nutrients and energy in microbial food webs.However,research on pleurostomatids remains insufficient,resulting in a paucity of molecular information and substantial gaps in knowledge of their phylogenetic relationships.In recent years,we investigated pleurostomatid diversity in various Chinese habitats,including their systematic relationships and taxonomic circumscriptions,which were comprehensively analyzed using an integrative morphomolecular approach.Results revealed that:(1)pleurostomatids can be categorized into two suborders,Protolitonotina subord.nov.and Amphileptina Jankowski,1967;(2)Protolitonotina subord.nov.represents the ancestral pleurostomatid group and includes two genera,Protolitonotus and Heterolitonotus gen.nov.,characterized by right kineties progressively shortened along rightmost full kineties and absence of a left dorsolateral kinety;(3)Heterolitonotus gen.nov.represents an orphan lineage and is defined by an oral slit extending to its dorsal margin;(4)“Protolitonotus clampi”does not group with congeners but instead represents an orphan lineage,thus Novilitonotus gen.nov.is established to which P.clampi is transferred as Novilitonotus clampi comb.nov.;(5)three new species,Apoamphileptus paraclaparedii sp.nov.,Heterolitonotus rex gen.nov.,sp.nov.,and Loxophyllum apohelus sp.nov.,are described;and(6)helices 21es6a to 21es6d within the V4 region of small subunit ribosomal RNA(SSU rRNA)may serve as a useful tool for discriminating pleurostomatids.The evolutionary relationships among all main lineages of pleurostomatids are discussed and a key to the identification of pleurostomatid genera is provided.
基金partially supported by the Fundamental Research Funds for the Central Universities(GK202207018)of China。
文摘We study the closed range property and the strict singularity of integration operators acting on the spaces F(p,pα-2,s).We completely characterize the closed range property of the Volterra companion operator I_(g)on F(p,pα-2,s),which generalizes the existing results and answers a question raised in[A.Anderson,Integral Equations Operator Theory,69(2011),no.1,87-99].For the Volterra operator J_(g),we show that,for 0<α≤1,J_(g)never has a closed range on F(p,pα-2,s).We then prove that the notions of compactness,weak compactness and strict singularity coincide in the case of J_(g)acting on F(p,p-2,s).
文摘During Chinese New Year holiday,characteristic folk customs activities significantly stimulated local tourism consumption potential and the high-quality development of tourism economy by integrating,leading and empowering local tourism projects.