Background: We aimed to evaluate the short-term metabolic effects of a GLP-1a, (liraglutide) versus a DPP-4i, (vildagliptin) in a group of sub-Saharan type 2 diabetes patients. Methods: We conducted a randomized contr...Background: We aimed to evaluate the short-term metabolic effects of a GLP-1a, (liraglutide) versus a DPP-4i, (vildagliptin) in a group of sub-Saharan type 2 diabetes patients. Methods: We conducted a randomized controlled single blinded clinical trial in 14 uncontrolled type 2 diabetes patients (HbA1c ≥ 53 mmol/mol) with mean duration of diabetes of 8 [1 - 12] years and median age of 57 [49 - 61] years. Baseline treatment consisted of metformin in monotherapy or metformin plus sulfonylureas. Participants were randomly allocated to 2 groups of add-on 1.2 mg/day subcutaneous liraglutide in group 1 or 100 mg/day of oral vildagliptin in group 2 for 2 weeks. In all participants, insulin secretion in response to mixed meal tolerance test, insulin sensitivity by 80 mU/m<sup>2</sup>/min hyperinsulinemic-euglycemic clamp, body composition, and lipid profile were measured before and after intervention. Results: At the end of intervention, insulin sensitivity remained unchanged both with liraglutide from 6.6 [4.2 - 7.9] to 6.9 [4.3 - 10.8] mg/kg/min;p = 0.61 and vildagliptin from 7.1 [5.3 - 9.0] to 6.5 [5.6 - 9.4] mg/kg/min (p = 0.86). The area under the C-peptide curve varied from 5.5 [1.0 - 10.9] to 14.9 [10.8 - 17.2] nmol/L/120min, p = 0.09 in group 1 and from 1.1 [0.5 - 14.1] to 13.0 [9.6 - 16.9] nmol/L/120min (p = 0.17) in group 2. LDL Cholesterol levels decreased significantly with liraglutide from 0.85 g/L [0.51 - 1.02] to 0.54 g/L [0.50 - 0.73] (p = 0.04) but not with Vildagliptin. Body weight tended to decrease in group 1 (−0.6 kg) versus modest increase in group 2 (+1.1 kg). Conclusion: Short-term metabolic effects of Liraglutide and Vildagliptin add-on therapy are comparable in sub-Saharan type 2 diabetes patients with a more favorable trend for Liraglutide on body weight, lipid profile, and insulin secretion.展开更多
The development of the medicinal trade and markets in late imperial China increased anxiety among scholarly physicians about the authenticity of medicines.Even though the market was typically depicted by scholarly phy...The development of the medicinal trade and markets in late imperial China increased anxiety among scholarly physicians about the authenticity of medicines.Even though the market was typically depicted by scholarly physicians as a place full of tricks and deceptions,it was a repertoire where practical knowledge about authentication was created and circulated.The specialized knowledge was mainly transmitted through oral tradition.But in some instances,it was also written down by scholarly physicians or merchants,allowing us to reconstruct the techniques and their underlying rationales.Authentication of medicines mobilized multiple sensory perceptions of the human body,consisting of observing,tasting,smelling,touching,and performing small tests.All these techniques played different roles in the practice of authentication.Even though these sensory techniques seemed like a collection of trivial and practical records without any coherent rationales,an underlying episteme could be detected through a close investigation.Merchants and practitioners in the market did not understand the nature and materiality of medicines by any established theories.Instead,they actively engaged with the tangible form of medicines through the senses and bodily techniques.This sensory form of knowing indicates a type of practical expertise that is distant from the scholarly tradition of materia medica in late imperial China.展开更多
Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women part...Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women participated between 14:00 and 15:00, taking the circadian rhythm of salivary secretion into account. The types and concentrations of the taste solutions were glutamic acid (1.7 × 10<sup>−3</sup> M), inosinic acid (9.8 × 10<sup>−3</sup> M), and guanylic acid (9.8 × 10<sup>−3</sup> M) for umami stimulation, citric acid (6.5 × 10<sup>−3</sup> M) for acidity stimulation, and sucrose (1.6 × 10<sup>−2</sup> M) for sweetness stimulation. First, the unstimulated salivary flow rate was measured. Then, 3 ml of a flavor solution was dropped under the tongue using a syringe. The saliva was expelled into an aluminum cup every minute and weighed. The first minute’s value minus 3 ml flavor solution was the stimulated salivary secretion rate produced by each flavor. The time-to-return to the initial unstimulated salivary flow rate was the duration of the stimulated saliva secretion rate. Results: The mean unstimulated salivary flow rate across participants was 0.64 ± 0.25 ml/min (range: 0.23 - 1.03 ml/min). The highest amount of saliva was induced by citric acid. There were significant differences between citric acid and the other flavor solutions (p < 0.05 for glutamic acid, inosinic acid, and sucrose;p < 0.01 for guanylic acid). There were no significant differences in duration of salivation between the flavor solutions. When the participants were divided into slow (0.45 ± 0.16 ml/min) and fast groups (0.83 ± 0.15 ml/min) based on their median resting salivary secretion rate, there were no significant differences between the two groups in the amount of saliva secreted at 1 minute after stimulation and the duration of the salivary secretion rate. Conclusion: Umami stimulation was effective in slowing salivary secretion and sustaining salivary secretion after stimulation.展开更多
Single atom catalysts(SACs)have garnered significant attention in the field of catalysis over the past decade due to their exceptional atom utilization efficiency and distinct physical and chemical properties.For the ...Single atom catalysts(SACs)have garnered significant attention in the field of catalysis over the past decade due to their exceptional atom utilization efficiency and distinct physical and chemical properties.For the semiconductor-based electrical gas sensor,the core is the catalysis process of target gas molecules on the sensitive materials.In this context,the SACs offer great potential for highly sensitive and selective gas sensing,however,only some of the bubbles come to the surface.To facilitate practical applications,we present a comprehensive review of the preparation strategies for SACs,with a focus on overcoming the challenges of aggregation and low loading.Extensive research efforts have been devoted to investigating the gas sensing mechanism,exploring sensitive materials,optimizing device structures,and refining signal post-processing techniques.Finally,the challenges and future perspectives on the SACs based gas sensing are presented.展开更多
Conventional blood sampling for glucose detection is prone to cause pain and fails to continuously record glucose fluctuations in vivo.Continuous glucose monitoring based on implantable electrodes could induce pain an...Conventional blood sampling for glucose detection is prone to cause pain and fails to continuously record glucose fluctuations in vivo.Continuous glucose monitoring based on implantable electrodes could induce pain and potential tissue inflammation,and the presence of reactive oxygen species(ROS)due to inflammationmay affect glucose detection.Microneedle technology is less invasive,yet microneedle adhesion with skin tissue is limited.In this work,we developed a microarrow sensor array(MASA),which provided enhanced skin surface adhesion and enabled simultaneous detection of glucose and H_(2)O_(2)(representative of ROS)in interstitial fluid in vivo.The microarrows fabricated via laser micromachining were modified with functional coating and integrated into a patch of a three-dimensional(3D)microneedle array.Due to the arrow tip mechanically interlocking with the tissue,the microarrow array could better adhere to the skin surface after penetration into skin.The MASA was demonstrated to provide continuous in vivo monitoring of glucose and H_(2)O_(2) concentrations,with the detection of H_(2)O_(2) providing a valuable reference for assessing the inflammation state.Finally,the MASA was integrated into a monitoring system using custom circuitry.This work provides a promising tool for the stable and reliable monitoring of blood glucose in diabetic patients.展开更多
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to u...In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three...In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
High-resolution remote sensing image segmentation is a challenging task. In urban remote sensing, the presenceof occlusions and shadows often results in blurred or invisible object boundaries, thereby increasing the d...High-resolution remote sensing image segmentation is a challenging task. In urban remote sensing, the presenceof occlusions and shadows often results in blurred or invisible object boundaries, thereby increasing the difficultyof segmentation. In this paper, an improved network with a cross-region self-attention mechanism for multi-scalefeatures based onDeepLabv3+is designed to address the difficulties of small object segmentation and blurred targetedge segmentation. First,we use CrossFormer as the backbone feature extraction network to achieve the interactionbetween large- and small-scale features, and establish self-attention associations between features at both large andsmall scales to capture global contextual feature information. Next, an improved atrous spatial pyramid poolingmodule is introduced to establish multi-scale feature maps with large- and small-scale feature associations, andattention vectors are added in the channel direction to enable adaptive adjustment of multi-scale channel features.The proposed networkmodel is validated using the PotsdamandVaihingen datasets. The experimental results showthat, compared with existing techniques, the network model designed in this paper can extract and fuse multiscaleinformation, more clearly extract edge information and small-scale information, and segment boundariesmore smoothly. Experimental results on public datasets demonstrate the superiority of ourmethod compared withseveral state-of-the-art networks.展开更多
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori...Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors.展开更多
Cereal is an essential source of calories and protein for the global population.Accurately predicting cereal quality before harvest is highly desirable in order to optimise management for farmers,grading harvest and c...Cereal is an essential source of calories and protein for the global population.Accurately predicting cereal quality before harvest is highly desirable in order to optimise management for farmers,grading harvest and categorised storage for enterprises,future trading prices,and policy planning.The use of remote sensing data with extensive spatial coverage demonstrates some potential in predicting crop quality traits.Many studies have also proposed models and methods for predicting such traits based on multiplatform remote sensing data.In this paper,the key quality traits that are of interest to producers and consumers are introduced.The literature related to grain quality prediction was analyzed in detail,and a review was conducted on remote sensing platforms,commonly used methods,potential gaps,and future trends in crop quality prediction.This review recommends new research directions that go beyond the traditional methods and discusses grain quality retrieval and the associated challenges from the perspective of remote sensing data.展开更多
Due to the fine-grained communication scenarios characterization and stability,Wi-Fi channel state information(CSI)has been increasingly applied to indoor sensing tasks recently.Although spatial variations are explici...Due to the fine-grained communication scenarios characterization and stability,Wi-Fi channel state information(CSI)has been increasingly applied to indoor sensing tasks recently.Although spatial variations are explicitlyreflected in CSI measurements,the representation differences caused by small contextual changes are easilysubmerged in the fluctuations of multipath effects,especially in device-free Wi-Fi sensing.Most existing datasolutions cannot fully exploit the temporal,spatial,and frequency information carried by CSI,which results ininsufficient sensing resolution for indoor scenario changes.As a result,the well-liked machine learning(ML)-based CSI sensing models still struggling with stable performance.This paper formulates a time-frequency matrixon the premise of demonstrating that the CSI has low-rank potential and then proposes a distributed factorizationalgorithm to effectively separate the stable structured information and context fluctuations in the CSI matrix.Finally,a multidimensional tensor is generated by combining the time-frequency gradients of CSI,which containsrich and fine-grained real-time contextual information.Extensive evaluations and case studies highlight thesuperiority of the proposal.展开更多
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of pictures.This study presents a new approach to the encryption and compression of color image...With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of pictures.This study presents a new approach to the encryption and compression of color images.It is predicated on 2D compressed sensing(CS)and the hyperchaotic system.First,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security.Then,the processed images are con-currently encrypted and compressed using 2D CS.Among them,chaotic sequences replace traditional random measurement matrices to increase the system’s security.Third,the processed images are re-encrypted using a combination of permutation and diffusion algorithms.In addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct images.Compared with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational complexity.Furthermore,it has better robustness.The experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.展开更多
The rapid development of the Internet of Things and artificial intelligence technologies has increased the need for wearable,portable,and self-powered flexible sensing devices.Triboelectric nanogenerators(TENGs)based ...The rapid development of the Internet of Things and artificial intelligence technologies has increased the need for wearable,portable,and self-powered flexible sensing devices.Triboelectric nanogenerators(TENGs)based on gel materials(with excellent conductivity,mechanical tunability,environmental adaptability,and biocompatibility)are considered an advanced approach for developing a new generation of flexible sensors.This review comprehensively summarizes the recent advances in gel-based TENGs for flexible sensors,covering their principles,properties,and applications.Based on the development requirements for flexible sensors,the working mechanism of gel-based TENGs and the characteristic advantages of gels are introduced.Design strategies for the performance optimization of hydrogel-,organogel-,and aerogel-based TENGs are systematically summarized.In addition,the applications of gel-based TENGs in human motion sensing,tactile sensing,health monitoring,environmental monitoring,human-machine interaction,and other related fields are summarized.Finally,the challenges of gel-based TENGs for flexible sensing are discussed,and feasible strategies are proposed to guide future research.展开更多
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since...Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
We propose a fast,adaptive multiscale resolution spectral measurement method based on compressed sensing.The method can apply variable measurement resolution over the entire spectral range to reduce the measurement ti...We propose a fast,adaptive multiscale resolution spectral measurement method based on compressed sensing.The method can apply variable measurement resolution over the entire spectral range to reduce the measurement time by over 75%compared to a global high-resolution measurement.Mimicking the characteristics of the human retina system,the resolution distribution follows the principle of gradually decreasing.The system allows the spectral peaks of interest to be captured dynamically or to be specified a priori by a user.The system was tested by measuring single and dual spectral peaks,and the results of spectral peaks are consistent with those of global high-resolution measurements.展开更多
文摘Background: We aimed to evaluate the short-term metabolic effects of a GLP-1a, (liraglutide) versus a DPP-4i, (vildagliptin) in a group of sub-Saharan type 2 diabetes patients. Methods: We conducted a randomized controlled single blinded clinical trial in 14 uncontrolled type 2 diabetes patients (HbA1c ≥ 53 mmol/mol) with mean duration of diabetes of 8 [1 - 12] years and median age of 57 [49 - 61] years. Baseline treatment consisted of metformin in monotherapy or metformin plus sulfonylureas. Participants were randomly allocated to 2 groups of add-on 1.2 mg/day subcutaneous liraglutide in group 1 or 100 mg/day of oral vildagliptin in group 2 for 2 weeks. In all participants, insulin secretion in response to mixed meal tolerance test, insulin sensitivity by 80 mU/m<sup>2</sup>/min hyperinsulinemic-euglycemic clamp, body composition, and lipid profile were measured before and after intervention. Results: At the end of intervention, insulin sensitivity remained unchanged both with liraglutide from 6.6 [4.2 - 7.9] to 6.9 [4.3 - 10.8] mg/kg/min;p = 0.61 and vildagliptin from 7.1 [5.3 - 9.0] to 6.5 [5.6 - 9.4] mg/kg/min (p = 0.86). The area under the C-peptide curve varied from 5.5 [1.0 - 10.9] to 14.9 [10.8 - 17.2] nmol/L/120min, p = 0.09 in group 1 and from 1.1 [0.5 - 14.1] to 13.0 [9.6 - 16.9] nmol/L/120min (p = 0.17) in group 2. LDL Cholesterol levels decreased significantly with liraglutide from 0.85 g/L [0.51 - 1.02] to 0.54 g/L [0.50 - 0.73] (p = 0.04) but not with Vildagliptin. Body weight tended to decrease in group 1 (−0.6 kg) versus modest increase in group 2 (+1.1 kg). Conclusion: Short-term metabolic effects of Liraglutide and Vildagliptin add-on therapy are comparable in sub-Saharan type 2 diabetes patients with a more favorable trend for Liraglutide on body weight, lipid profile, and insulin secretion.
基金funded by the project“宋元以来中医知识的演变与现代中医的形成”(The Evolution of TCM Knowledge Since the Song and Yuan Dynasties and the Formation of Modern Chinese Medicine)supported by the National Social Science Fund of China)(No.18ZDA75)。
文摘The development of the medicinal trade and markets in late imperial China increased anxiety among scholarly physicians about the authenticity of medicines.Even though the market was typically depicted by scholarly physicians as a place full of tricks and deceptions,it was a repertoire where practical knowledge about authentication was created and circulated.The specialized knowledge was mainly transmitted through oral tradition.But in some instances,it was also written down by scholarly physicians or merchants,allowing us to reconstruct the techniques and their underlying rationales.Authentication of medicines mobilized multiple sensory perceptions of the human body,consisting of observing,tasting,smelling,touching,and performing small tests.All these techniques played different roles in the practice of authentication.Even though these sensory techniques seemed like a collection of trivial and practical records without any coherent rationales,an underlying episteme could be detected through a close investigation.Merchants and practitioners in the market did not understand the nature and materiality of medicines by any established theories.Instead,they actively engaged with the tangible form of medicines through the senses and bodily techniques.This sensory form of knowing indicates a type of practical expertise that is distant from the scholarly tradition of materia medica in late imperial China.
文摘Purpose: Umami reportedly promotes salivation. We aimed to investigate the effects of taste stimuli on slow and fast salivary secretion in humans using umami, sweet, and sour stimuli. Methods: Eight healthy women participated between 14:00 and 15:00, taking the circadian rhythm of salivary secretion into account. The types and concentrations of the taste solutions were glutamic acid (1.7 × 10<sup>−3</sup> M), inosinic acid (9.8 × 10<sup>−3</sup> M), and guanylic acid (9.8 × 10<sup>−3</sup> M) for umami stimulation, citric acid (6.5 × 10<sup>−3</sup> M) for acidity stimulation, and sucrose (1.6 × 10<sup>−2</sup> M) for sweetness stimulation. First, the unstimulated salivary flow rate was measured. Then, 3 ml of a flavor solution was dropped under the tongue using a syringe. The saliva was expelled into an aluminum cup every minute and weighed. The first minute’s value minus 3 ml flavor solution was the stimulated salivary secretion rate produced by each flavor. The time-to-return to the initial unstimulated salivary flow rate was the duration of the stimulated saliva secretion rate. Results: The mean unstimulated salivary flow rate across participants was 0.64 ± 0.25 ml/min (range: 0.23 - 1.03 ml/min). The highest amount of saliva was induced by citric acid. There were significant differences between citric acid and the other flavor solutions (p < 0.05 for glutamic acid, inosinic acid, and sucrose;p < 0.01 for guanylic acid). There were no significant differences in duration of salivation between the flavor solutions. When the participants were divided into slow (0.45 ± 0.16 ml/min) and fast groups (0.83 ± 0.15 ml/min) based on their median resting salivary secretion rate, there were no significant differences between the two groups in the amount of saliva secreted at 1 minute after stimulation and the duration of the salivary secretion rate. Conclusion: Umami stimulation was effective in slowing salivary secretion and sustaining salivary secretion after stimulation.
基金supported by the National Key Research and Development Program of China(2022YFB3204700)the National Natural Science Foundation of China(52122513)+2 种基金the Natural Science Foundation of Heilongjiang Province(YQ2021E022)the Natural Science Foundation of Chongqing(2023NSCQ-MSX2286)the Fundamental Research Funds for the Central Universities(HIT.BRET.2021010)。
文摘Single atom catalysts(SACs)have garnered significant attention in the field of catalysis over the past decade due to their exceptional atom utilization efficiency and distinct physical and chemical properties.For the semiconductor-based electrical gas sensor,the core is the catalysis process of target gas molecules on the sensitive materials.In this context,the SACs offer great potential for highly sensitive and selective gas sensing,however,only some of the bubbles come to the surface.To facilitate practical applications,we present a comprehensive review of the preparation strategies for SACs,with a focus on overcoming the challenges of aggregation and low loading.Extensive research efforts have been devoted to investigating the gas sensing mechanism,exploring sensitive materials,optimizing device structures,and refining signal post-processing techniques.Finally,the challenges and future perspectives on the SACs based gas sensing are presented.
基金This work was financially supported by the National Key R&D Program of China(Nos.2021YFF1200700 and 2021YFA0911100)the National Natural Science Foundation of China(Nos.32171399,32171456,and T2225010)+6 种基金the Guangdong Basic and Applied Basic Research Foundation(No.2021A1515012261)the Science and Technology Program of Guangzhou,China(No.202103000076)the Fundamental Research Funds for the Central Universities,Sun Yat-Sen University(No.22dfx02),and Pazhou Lab,Guangzhou(No.PZL2021KF0003)FML would like to thank the National Natural Science Foundation of China(Nos.32171335 and 31900954)JL would like to thank the National Natural Science Foundation of China(No.62105380)the China Postdoctoral Science Foundation(No.2021M693686)QQOY would like to thank the China Postdoctoral Science Foundation(No.2022M713645).
文摘Conventional blood sampling for glucose detection is prone to cause pain and fails to continuously record glucose fluctuations in vivo.Continuous glucose monitoring based on implantable electrodes could induce pain and potential tissue inflammation,and the presence of reactive oxygen species(ROS)due to inflammationmay affect glucose detection.Microneedle technology is less invasive,yet microneedle adhesion with skin tissue is limited.In this work,we developed a microarrow sensor array(MASA),which provided enhanced skin surface adhesion and enabled simultaneous detection of glucose and H_(2)O_(2)(representative of ROS)in interstitial fluid in vivo.The microarrows fabricated via laser micromachining were modified with functional coating and integrated into a patch of a three-dimensional(3D)microneedle array.Due to the arrow tip mechanically interlocking with the tissue,the microarrow array could better adhere to the skin surface after penetration into skin.The MASA was demonstrated to provide continuous in vivo monitoring of glucose and H_(2)O_(2) concentrations,with the detection of H_(2)O_(2) providing a valuable reference for assessing the inflammation state.Finally,the MASA was integrated into a monitoring system using custom circuitry.This work provides a promising tool for the stable and reliable monitoring of blood glucose in diabetic patients.
文摘In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same position.But if the shareholders have two different positions,essential and non‐essential,it is necessary to use essential secret image sharing schemes.In this article,a verifiable essential secret image sharing scheme based on HLRs is proposed.Shareholder's share consists of two parts.The first part is produced by the shareholders,which prevents the fraud of dealers.The second part is a shadow image that is produced by using HLRs and the first part of share.The verification of the first part of the shares is done for the first time by using multilinear and bilinear maps.Also,for verifying shadow images,Bloom Filters are used for the first time.The proposed scheme is more efficient than similar schemes,and for the first part of the shares,has formal security.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金Project supported by the Offline Course Program of“Experiment of College Physics”in the 2022-year Anhui Provincial Quality Engineering Program (Grant No.2022xxkc134)the Program for Academic Leader Reserve Candidates in Tongling University (Grant Nos.2020tlxyxs43 and 2014tlxyxs30)+1 种基金the Talent Scientific Research Foundation of Tongling University (Grant No.2015tlxyrc01)the 2014 year Program for Excellent Youth Talents in University of Anhui Province。
文摘In paper[Chin.Phys.B 32070308(2023)],Xing et al.proposed a semi-quantum secret sharing protocol by using single particles.We study the security of the proposed protocol and find that it is not secure,that is,the three dishonest agents,Bob,Charlie and Emily can collude to obtain Alice's secret without the help of David.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金the National Natural Science Foundation of China(Grant Number 62066013)Hainan Provincial Natural Science Foundation of China(Grant Numbers 622RC674 and 2019RC182).
文摘High-resolution remote sensing image segmentation is a challenging task. In urban remote sensing, the presenceof occlusions and shadows often results in blurred or invisible object boundaries, thereby increasing the difficultyof segmentation. In this paper, an improved network with a cross-region self-attention mechanism for multi-scalefeatures based onDeepLabv3+is designed to address the difficulties of small object segmentation and blurred targetedge segmentation. First,we use CrossFormer as the backbone feature extraction network to achieve the interactionbetween large- and small-scale features, and establish self-attention associations between features at both large andsmall scales to capture global contextual feature information. Next, an improved atrous spatial pyramid poolingmodule is introduced to establish multi-scale feature maps with large- and small-scale feature associations, andattention vectors are added in the channel direction to enable adaptive adjustment of multi-scale channel features.The proposed networkmodel is validated using the PotsdamandVaihingen datasets. The experimental results showthat, compared with existing techniques, the network model designed in this paper can extract and fuse multiscaleinformation, more clearly extract edge information and small-scale information, and segment boundariesmore smoothly. Experimental results on public datasets demonstrate the superiority of ourmethod compared withseveral state-of-the-art networks.
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
基金the National Natural Science Foundation of China(Nos.62002028,62102040 and 62202066).
文摘Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors.
基金This study was supported by the National Natural Science Foundation of China(42271396)the Natural Science Foundation of Shandong Province(ZR2022MD017)+1 种基金the Key R&D Project of Hebei Province(22326406D)The European Space Agency(ESA)and Ministry of Science and Technology of China(MOST)Dragon(57457).
文摘Cereal is an essential source of calories and protein for the global population.Accurately predicting cereal quality before harvest is highly desirable in order to optimise management for farmers,grading harvest and categorised storage for enterprises,future trading prices,and policy planning.The use of remote sensing data with extensive spatial coverage demonstrates some potential in predicting crop quality traits.Many studies have also proposed models and methods for predicting such traits based on multiplatform remote sensing data.In this paper,the key quality traits that are of interest to producers and consumers are introduced.The literature related to grain quality prediction was analyzed in detail,and a review was conducted on remote sensing platforms,commonly used methods,potential gaps,and future trends in crop quality prediction.This review recommends new research directions that go beyond the traditional methods and discusses grain quality retrieval and the associated challenges from the perspective of remote sensing data.
基金the National Natural Science Foundation of China under Grant 61771258 and Grant U1804142the Key Science and Technology Project of Henan Province under Grants 202102210280,212102210159,222102210192,232102210051the Key Scientific Research Projects of Colleges and Universities in Henan Province under Grant 20B460008.
文摘Due to the fine-grained communication scenarios characterization and stability,Wi-Fi channel state information(CSI)has been increasingly applied to indoor sensing tasks recently.Although spatial variations are explicitlyreflected in CSI measurements,the representation differences caused by small contextual changes are easilysubmerged in the fluctuations of multipath effects,especially in device-free Wi-Fi sensing.Most existing datasolutions cannot fully exploit the temporal,spatial,and frequency information carried by CSI,which results ininsufficient sensing resolution for indoor scenario changes.As a result,the well-liked machine learning(ML)-based CSI sensing models still struggling with stable performance.This paper formulates a time-frequency matrixon the premise of demonstrating that the CSI has low-rank potential and then proposes a distributed factorizationalgorithm to effectively separate the stable structured information and context fluctuations in the CSI matrix.Finally,a multidimensional tensor is generated by combining the time-frequency gradients of CSI,which containsrich and fine-grained real-time contextual information.Extensive evaluations and case studies highlight thesuperiority of the proposal.
基金This work was supported in part by the National Natural Science Foundation of China under Grants 71571091,71771112the State Key Laboratory of Synthetical Automation for Process Industries Fundamental Research Funds under Grant PAL-N201801the Excellent Talent Training Project of University of Science and Technology Liaoning under Grant 2019RC05.
文摘With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of pictures.This study presents a new approach to the encryption and compression of color images.It is predicated on 2D compressed sensing(CS)and the hyperchaotic system.First,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security.Then,the processed images are con-currently encrypted and compressed using 2D CS.Among them,chaotic sequences replace traditional random measurement matrices to increase the system’s security.Third,the processed images are re-encrypted using a combination of permutation and diffusion algorithms.In addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct images.Compared with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational complexity.Furthermore,it has better robustness.The experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
基金supported by the National Natural Science Foundation of China(22068005,22278091)the Training Program for 1000 Backbone Teachers in Guangxi(2022).
文摘The rapid development of the Internet of Things and artificial intelligence technologies has increased the need for wearable,portable,and self-powered flexible sensing devices.Triboelectric nanogenerators(TENGs)based on gel materials(with excellent conductivity,mechanical tunability,environmental adaptability,and biocompatibility)are considered an advanced approach for developing a new generation of flexible sensors.This review comprehensively summarizes the recent advances in gel-based TENGs for flexible sensors,covering their principles,properties,and applications.Based on the development requirements for flexible sensors,the working mechanism of gel-based TENGs and the characteristic advantages of gels are introduced.Design strategies for the performance optimization of hydrogel-,organogel-,and aerogel-based TENGs are systematically summarized.In addition,the applications of gel-based TENGs in human motion sensing,tactile sensing,health monitoring,environmental monitoring,human-machine interaction,and other related fields are summarized.Finally,the challenges of gel-based TENGs for flexible sensing are discussed,and feasible strategies are proposed to guide future research.
基金support from the National Natural Science Foundation of China (No.62005164,62222507,62175101,and 62005166)the Shanghai Natural Science Foundation (23ZR1443700)+3 种基金Shuguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission (23SG41)the Young Elite Scientist Sponsorship Program by CAST (No.20220042)Science and Technology Commission of Shanghai Municipality (Grant No.21DZ1100500)the Shanghai Municipal Science and Technology Major Project,and the Shanghai Frontiers Science Center Program (2021-2025 No.20).
文摘Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display.
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.
基金Project supported by the Natural Science Foundation of Shandong Province,China(Grant Nos.ZR2020MF119 and ZR2020MA082)the National Natural Science Foundation of China(Grant No.62002208)the National Key Research and Development Program of China(Grant No.2018YFB0504302).
文摘We propose a fast,adaptive multiscale resolution spectral measurement method based on compressed sensing.The method can apply variable measurement resolution over the entire spectral range to reduce the measurement time by over 75%compared to a global high-resolution measurement.Mimicking the characteristics of the human retina system,the resolution distribution follows the principle of gradually decreasing.The system allows the spectral peaks of interest to be captured dynamically or to be specified a priori by a user.The system was tested by measuring single and dual spectral peaks,and the results of spectral peaks are consistent with those of global high-resolution measurements.