The advancement of Clustered Regularly Interspaced Short Palindromic Repeats(CRISPR)gene editing technology has revolutionized the comprehension of human genome,propelling molecular and cellular biology research into ...The advancement of Clustered Regularly Interspaced Short Palindromic Repeats(CRISPR)gene editing technology has revolutionized the comprehension of human genome,propelling molecular and cellular biology research into unexplored realms and accelerating progress in life sciences and medicine.CRISPR-based gene screening,recognized for its efficiency and practicality,is widely utilized across diverse biological fields.Aging is a multifaceted process governed by a myriad of genetic and epigenetic factors.Unraveling the genes regulating aging holds promise for understanding this intricate phenomenon and devising strategies for its assessment and intervention.This review provides a comprehensive overview of the progress in CRISPR screening and its applications in aging research,while also offering insights into future directions.CRISPR-based genetic-manipulation tools are positioned as indispensable instruments for mitigating aging and managing age-related diseases.展开更多
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ...Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one.展开更多
The fusion of urban agriculture, ecotourism and cultural innovation industry has been a necessary way for industry updating, value increase and income im- provement of farmers in suburbs. The methods available of the ...The fusion of urban agriculture, ecotourism and cultural innovation industry has been a necessary way for industry updating, value increase and income im- provement of farmers in suburbs. The methods available of the fusion are as fol- lows: corporation development and operation, led by government with an integrated plan; corporation management and development under guidance of market with sup- port from government; collective development under guidance of market and policies; individual development and operation with the model of "villagers participation de- pending on infrastructure provided by government". The four routes enjoy exclusive advantages and characters. Hence, different villages and towns should adopt the most suitable one according to local conditions for further development and management.展开更多
In searching for differentially expressed genes in human uterine leiomyomas (ULs), suppression sub-tractive hybridization was used to construct an UL up-regulated library, which turned out to represent 88genes. After ...In searching for differentially expressed genes in human uterine leiomyomas (ULs), suppression sub-tractive hybridization was used to construct an UL up-regulated library, which turned out to represent 88genes. After two rounds of screening by reverse Northern analysis, twenty genes were proved to be up-regulated, including seventeen known genes and three genes with unknown function. All these genes werefirstly associated with UL. Three genes with notable difference were selected for Northern confirmationOur results proved the authenticity of the twenty genes. One gene named Phospholipase A2 (PLA2) showedup-regulation in 4/6 of the patients and investigation of tissue distribution indicated that it had obviousexpression in prostate, testis, liver, heart and skeletal muscle.展开更多
Integrated multi-trophic aquaculture (IMTA) has been proposed as a concept that combines the cultivation of fed aquaculture species (e.g., finfish/shrimp) with extractive aquaculture species (e.g., shellfish/seaweed)....Integrated multi-trophic aquaculture (IMTA) has been proposed as a concept that combines the cultivation of fed aquaculture species (e.g., finfish/shrimp) with extractive aquaculture species (e.g., shellfish/seaweed). In seaweed-based integrated aquaculture, seaweeds have the capacity to reduce the environmental impact of nitrogen-rich effluents on coastal ecosystems. Thus, selection of optimal species for such aquaculture is of great importance. The present study aimed to develop a seaweed species-selection index for selecting suitable species in seaweed-based integrated aquaculture system. The index was synthesized using available literature-based information, reference data, and physiological seaweed experiments to identify and prioritize the desired species. Undaria pinnatifida, Porphyra yezoensis and Ulva compressa scored the highest according to a seaweed-based integrated aquaculture suitability index (SASI). Seaweed species with the highest scores were adjudged to fit the integrated aquaculture systems. Despite the application of this model limited by local aquaculture environment, it is considered to be a useful tool for selecting seaweed species in IMTA.展开更多
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.展开更多
The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct m...The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct meaning of words, especially in the field of non-literary tanslation. My purpose is rather to show translators -- and, by extension, others who are learning English -- how to recognize the accurate message of words in a first draft and how to revise them so as to eliminate those incorrect translated texts.展开更多
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat...A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.展开更多
文摘The advancement of Clustered Regularly Interspaced Short Palindromic Repeats(CRISPR)gene editing technology has revolutionized the comprehension of human genome,propelling molecular and cellular biology research into unexplored realms and accelerating progress in life sciences and medicine.CRISPR-based gene screening,recognized for its efficiency and practicality,is widely utilized across diverse biological fields.Aging is a multifaceted process governed by a myriad of genetic and epigenetic factors.Unraveling the genes regulating aging holds promise for understanding this intricate phenomenon and devising strategies for its assessment and intervention.This review provides a comprehensive overview of the progress in CRISPR screening and its applications in aging research,while also offering insights into future directions.CRISPR-based genetic-manipulation tools are positioned as indispensable instruments for mitigating aging and managing age-related diseases.
基金Supported by the National Natural Science Foundation of China(60603010,60970120)~~
文摘Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one.
基金Supported by Beijing Natural Science Foundation(9122010)~~
文摘The fusion of urban agriculture, ecotourism and cultural innovation industry has been a necessary way for industry updating, value increase and income im- provement of farmers in suburbs. The methods available of the fusion are as fol- lows: corporation development and operation, led by government with an integrated plan; corporation management and development under guidance of market with sup- port from government; collective development under guidance of market and policies; individual development and operation with the model of "villagers participation de- pending on infrastructure provided by government". The four routes enjoy exclusive advantages and characters. Hence, different villages and towns should adopt the most suitable one according to local conditions for further development and management.
文摘In searching for differentially expressed genes in human uterine leiomyomas (ULs), suppression sub-tractive hybridization was used to construct an UL up-regulated library, which turned out to represent 88genes. After two rounds of screening by reverse Northern analysis, twenty genes were proved to be up-regulated, including seventeen known genes and three genes with unknown function. All these genes werefirstly associated with UL. Three genes with notable difference were selected for Northern confirmationOur results proved the authenticity of the twenty genes. One gene named Phospholipase A2 (PLA2) showedup-regulation in 4/6 of the patients and investigation of tissue distribution indicated that it had obviousexpression in prostate, testis, liver, heart and skeletal muscle.
基金supported by the ‘Greenhouse Gas Emissions Reduction Using Seaweeds’ programthe Jeju Sea Grant College Program funded by the Korean Ministry of Land, Transport and Maritime Affairs, Republic of Korea
文摘Integrated multi-trophic aquaculture (IMTA) has been proposed as a concept that combines the cultivation of fed aquaculture species (e.g., finfish/shrimp) with extractive aquaculture species (e.g., shellfish/seaweed). In seaweed-based integrated aquaculture, seaweeds have the capacity to reduce the environmental impact of nitrogen-rich effluents on coastal ecosystems. Thus, selection of optimal species for such aquaculture is of great importance. The present study aimed to develop a seaweed species-selection index for selecting suitable species in seaweed-based integrated aquaculture system. The index was synthesized using available literature-based information, reference data, and physiological seaweed experiments to identify and prioritize the desired species. Undaria pinnatifida, Porphyra yezoensis and Ulva compressa scored the highest according to a seaweed-based integrated aquaculture suitability index (SASI). Seaweed species with the highest scores were adjudged to fit the integrated aquaculture systems. Despite the application of this model limited by local aquaculture environment, it is considered to be a useful tool for selecting seaweed species in IMTA.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006 the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
文摘A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.
文摘The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct meaning of words, especially in the field of non-literary tanslation. My purpose is rather to show translators -- and, by extension, others who are learning English -- how to recognize the accurate message of words in a first draft and how to revise them so as to eliminate those incorrect translated texts.
文摘A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.