This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe...This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.展开更多
The different reservoirs in deep Songliao Basin have non-homogeneous lithologies and include multiple layers with a high content of hydrogen gas.The gas composition and stable isotope characteristics vary significantl...The different reservoirs in deep Songliao Basin have non-homogeneous lithologies and include multiple layers with a high content of hydrogen gas.The gas composition and stable isotope characteristics vary significantly,but the origin analysis of different gas types has previously been weak.Based on the geochemical parameters of gas samples from different depths and the analysis of geological settings,this research covers the diverse origins of natural gas in different strata.The gas components are mainly methane with a small amount of C_(2+),and non-hydrocarbon gases,including nitrogen(N_(2)),hydrogen(H_(2)),carbon dioxide(CO_(2)),and helium(He).At greater depth,the carbon isotope of methane becomes heavier,and the hydrogen isotope points to a lacustrine sedimentary environment.With increasing depth,the origins of N_(2)and CO_(2)change gradually from a mixture of organic and inorganic to inorganic.The origins of hydrogen gas are complex and include organic sources,water radiolysis,water-rock(Fe^(2+)-containing minerals)reactions,and mantle-derived.The shales of Denglouku and Shahezi Formations,as source rocks,provide the premise for generation and occurrence of organic gas.Furthermore,the deep faults and fluid activities in Basement Formation control the generation and migration of mantle-derived gas.The discovery of a high content of H_(2)in study area not only reveals the organic and inorganic association of natural-gas generation,but also provides a scientific basis for the exploration of deep hydrogen-rich gas.展开更多
Cotton fiber quality is a persistent concern that determines planting benefits and the quality of finished textile products.However,the limitations of measurement instruments have hindered the accurate evaluation of s...Cotton fiber quality is a persistent concern that determines planting benefits and the quality of finished textile products.However,the limitations of measurement instruments have hindered the accurate evaluation of some important fiber characteristics such as fiber maturity,fineness,and neps,which in turn has impeded the genetic improvement and industrial utilization of cotton fiber.Here,12 single fiber quality traits were measured using Advanced Fiber Information System(AFIS)equipment among 383 accessions of upland cotton(Gossypium hirsutum L.).In addition,eight conventional fiber quality traits were assessed by the High Volume Instrument(HVI)System.Genome-wide association study(GWAS),linkage disequilibrium(LD)block genotyping and functional identification were conducted sequentially to uncover the associated elite loci and candidate genes of fiber quality traits.As a result,the previously reported pleiotropic locus FL_D11 regulating fiber length-related traits was identified in this study.More importantly,three novel pleiotropic loci(FM_A03,FF_A05,and FN_A07)regulating fiber maturity,fineness and neps,respectively,were detected based on AFIS traits.Numerous highly promising candidate genes were screened out by integrating RNA-seq and qRT-PCR analyses,including the reported GhKRP6 for fiber length,the newly identified GhMAP8 for maturity and GhDFR for fineness.The origin and evolutionary analysis of pleiotropic loci indicated that the selection pressure on FL_D11,FM_A03 and FF_A05 increased as the breeding period approached the present and the origins of FM_A03 and FF_A05 were traced back to cotton landraces.These findings reveal the genetic basis underlying fiber quality and provide insight into the genetic improvement and textile utilization of fiber in G.hirsutum.展开更多
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus...Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications.展开更多
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s...Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.展开更多
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ...Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases.展开更多
Identification of the S genotype of Malus plants will greatly promote the discovery of new genes,the cultivation and production of apple,the breeding of new varieties,and the origin and evolution of self-incompatibili...Identification of the S genotype of Malus plants will greatly promote the discovery of new genes,the cultivation and production of apple,the breeding of new varieties,and the origin and evolution of self-incompatibility in Malus plants.In this experiment,88 Malus germplasm resources,such as Aihuahong,Xishuhaitang,and Reguanzi,were used as materials.Seven gene-specific primer combinations were used in the genotype identification.PCR amplification using leaf DNA produced a single S-RNase gene fragment in all materials.The results revealed that 70 of the identified materials obtained a complete S-RNase genotype,while only one S-RNase gene was found in 18 of them.Through homology comparison and analysis,13 S-RNase genotypes were obtained:S_(1)S_(2)(Aihuahong,etc.),S_(1)S_(28)(Xixian Haitang,etc.),S_(1)S_(51)(Hebei Pingdinghaitang),S_(1)S_(3)(Xiangyangcun Daguo,etc.),S_(2)S_(3)(Zhaiyehaitang,etc.),S_(3)S_(51)(Xishan 1),S_(3)S_(28)(Huangselihaerde,etc.),S_(2)S_(28)(Honghaitang,etc.),S_(4)S_(28)(Bo 11),S_(7)S_(28)(Jiuquan Shaguo),S_(10)S_e(Dongchengguan 13),S_(10)S_(21)(Dongxiangjiao)and S_(3)S_(51)(Xiongyue Haitang).Simultaneously,the frequency of the S gene in the tested materials was analyzed.The findings revealed that different S genes had varying frequencies in Malus resources,as well as varying frequencies between intraspecific and interspecific.S_(3) had the highest frequency of 68.18%,followed by S_(1)(42.04%).In addition,the phylogenetic tree and origin evolution analysis revealed that the S gene differentiation was completed prior to the formation of various apple species,that cultivated species also evolved new S genes,and that the S_(50) gene is the oldest S allele in Malus plants.The S_(1),S_(29),and S_(33) genes in apple-cultivated species,on the other hand,may have originated in M.sieversii,M.hupehensis,and M.kansuensis,respectively.In addition to M.sieversii,M.kansuensis and M.sikkimensis may have also played a role in the origin and evolution of some Chinese apples.展开更多
Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 16...Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits.展开更多
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed...With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.展开更多
BACKGROUND Retroperitoneal high-grade serous carcinoma(HGSC)of unknown origin is a sporadic tumor that can originate from ovarian cancer.Herein,we report the case of a woman with retroperitoneal HGSC of unknown origin...BACKGROUND Retroperitoneal high-grade serous carcinoma(HGSC)of unknown origin is a sporadic tumor that can originate from ovarian cancer.Herein,we report the case of a woman with retroperitoneal HGSC of unknown origin and describe how she was diagnosed and treated.CASE SUMMARY A 71-year-old female presented with the tumor marker CA125 elevated to 1041.9 U/mL upon a regular health examination.Computed tomography revealed retroperitoneal lymph node enlargement.Subsequently,positron emission tomography scanning revealed lesions with increased F-18 fluorodeoxyglucose uptake at the nodes.As a result,she underwent laparoscopic lymph node resection,and pathology revealed metastatic adenocarcinoma with CK7(+),PAX8(+),WT1(+),PR(-),and p53 mutational loss of expression,indicating that the origin may be from the adnexa.The patient was admitted to our ward and underwent laparoscopic staging;however,the pathological results were negative.Under the suspicion of retroperitoneal HGSC of unknown origin,chemotherapy and targeted therapy were initiated.Tumor marker levels decreased after treatment.CONCLUSION We present a case of HGSC of unknown origin managed using retroperitoneal lymphadenectomy,staging surgery,chemotherapy,and targeted therapy.展开更多
By studying the light isotopic compositions of carbon,oxygen,and hydrogen,combined with previous research results on the ore-forming source of the deposit,the authors try to uncover its metallogenic origin.The δ^(18)...By studying the light isotopic compositions of carbon,oxygen,and hydrogen,combined with previous research results on the ore-forming source of the deposit,the authors try to uncover its metallogenic origin.The δ^(18)O and δ^(13)C isotope signatures of dolomite samples vary between 10.2 and 13.0‰,and between−7.2 and−5.2‰,respectively,implying that the carbon derives from the upper mantle.δD and δ^(18) O of quartz,biotite,and muscovite from diff erent ore veins of the deposit vary between−82 and−59‰,and between 11.6 and 12.4‰,respectively,implying that the metallogenic solutions are mainly magmatic.According to the relevant research results of many isotope geologists,the fractionation degree of hydrogen isotopes increases as the depth to the Earth’s core increases,and the more diff erentiated the hydrogen isotopes are,the lower their values will be.In other words,mantle-derived solutions can have extremely low hydrogen isotope values.This means that the δD‰ value−134 of the pyrrhotite sample numbered SD-34 in this article may indicate mantle-derived oreforming fl uid of the deposit.The formation of the Dashuigou tellurium deposit occurred between 91.71 and 80.19 Ma.展开更多
Anomalous origin of the left coronary artery (AOLCA) from the right sinus of Valsalva constitutes a rare congenital coronary artery anomaly. Patients with an anomalous left main coronary artery face a significantly hi...Anomalous origin of the left coronary artery (AOLCA) from the right sinus of Valsalva constitutes a rare congenital coronary artery anomaly. Patients with an anomalous left main coronary artery face a significantly higher risk of sudden cardiac death compared to those with an anomalous right coronary artery. The anomalous coronary artery traversing between the ascending aorta and the pulmonary artery markedly heightens the risk of myocardial ischemia, arrhythmia, and sudden death. Symptomatic patients often exhibit a longer intramural course of the coronary artery, which may necessitate earlier intervention or influence the choice of surgical repair method. Surgical intervention is advocated for patients with this anomaly, even in the absence of symptoms. For anomalous aortic origin of a coronary artery from the opposite sinus of Valsalva with an intramural course, coronary unroofing is the preferred revascularization procedure. This report presents a case of AOLCA originating from the right sinus of Valsalva, treated surgically using the unroofing technique for the aortic intramural segment of the anomalous coronary artery traversing between the great vessels. The unroofing technique is recommended for treating AOLCA with an extensive intramural course that does not involve the commissure.展开更多
[Objectives]This study was conducted to clarify the difference of millet from different producing areas in near-infrared spectroscopy(NIRS)modeling.[Methods]Millet samples from six different regions were collected for...[Objectives]This study was conducted to clarify the difference of millet from different producing areas in near-infrared spectroscopy(NIRS)modeling.[Methods]Millet samples from six different regions were collected for NIRS analysis,and an origin identification model based on BP neural network was established.The competitive adaptive reweighted sampling(CARS)algorithm was used to extract characteristic wavelength variables,and a CARS-BP model was established on this basis.Finally,the CARS-BP model was compared with support vector machine(SVM),partial least squares discriminant analysis(PLS)and KNN models.[Results]The characteristic wavelengths were extracted by CARS,and the number of variables was reduced from 1845 to 130.The discrimination accuracy of the CARS-BP model for the samples from six producing areas reached 98.1%,which was better than SVM,PSL and KNN models.[Conclusions]NIRS can quickly and accurately identify the origin of millet,providing a new method and way for the origin identification and quality evaluation of millet.展开更多
Humans across cultures convey feelings and thoughts through music.Despite its ubiquity,the origins and evolution of music remain enigmatic.Archaeological evidence has traced the history of music back at least 40000 ye...Humans across cultures convey feelings and thoughts through music.Despite its ubiquity,the origins and evolution of music remain enigmatic.Archaeological evidence has traced the history of music back at least 40000 years ago based on prehistoric bone flutes(Fitch,2006).Comparative studies have also explored earlier histories by identifying common musical features between animals and humans(Fitch,2006).For example,songbirds exhibit categorical rhythms similar to human music(Roeske et al.,2020),and humans can recognize emotional arousal in signals across all classes of terrestrial vertebrates(Filippi et al.,2017).These findings,while surprising,align with the longstanding human perception of animal signals as music(Gray et al.,2001).The universality of music and its features intensifies the fundamental question posed by Darwin(1871):how has a behavior that is energetically costly and seemingly non-adaptive evolved to become so widespread?This question can be further divided into two sub-questions(Savage et al.,2021):(1)how do musical features contribute to the production or expressive power of music(i.e.,mechanisms),and(2)how does music benefit performers in terms of survival,reproductions,or other aspects(i.e.,functions).展开更多
Purpose–To facilitate technical managers and field workers to master and understand the provisions of Technical Management Regulations for Railway more accurately,so as to better serve the comprehensive revision of t...Purpose–To facilitate technical managers and field workers to master and understand the provisions of Technical Management Regulations for Railway more accurately,so as to better serve the comprehensive revision of the Regulations,this paper carries out the research on the traceability and evolution of the provisions of the Regulations.Design/methodology/approach–This paper studies and analyzes the evolution of the 11th edition of the Regulations by analyzing the relevance of clauses and summarizes the historical background of the development of calendar editions of the Regulations.The basic research on the traceability and evolution of the Regulations is carried out from four aspects:the continuity of the development of the Regulations,the authority of contents,the relevance of clauses and the richness of historical materials.Findings–From the first edition of the Regulations issued by the former Ministry of Railways in 1950 to the 11th edition,there have been ten comprehensive revisions.There is a strong correlation and continuity between the calendar editions of the Regulations in terms of chapter structure and clauses.Studying the context of the terms of the Regulations is an important way to understand and master the current clauses of the Regulations.Originality/value–Through the research on the traceability and evolution of the clauses of the Regulations,one is to explore the context of the development of railway technical equipment in China,the other is to clarify the historical background when the provisions were formulated and the third is to trace the development and evolution of the provisions.The revision of the Regulations is based on an accurate grasp of the context of the provisions,which can effectively judge the possible security risks caused by the revision of the provisions and avoid the possible risks in field implementation from the source.展开更多
基金the National Natural Science Foundation of China(Nos.62272478,61872384)Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584)+1 种基金National Natural Science Foundation of China(No.62172436)Engineering University of PAP’s Funding for Scientific Research Innovation Team,Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
文摘This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.
基金supported by the National Natural Science Foundation of China(Grant No.42072168)the National Key R&D Program of China(Grant No.2019YFC0605405)the Fundamental Research Funds for the Central Universities(Grant No.2023ZKPYDC07)。
文摘The different reservoirs in deep Songliao Basin have non-homogeneous lithologies and include multiple layers with a high content of hydrogen gas.The gas composition and stable isotope characteristics vary significantly,but the origin analysis of different gas types has previously been weak.Based on the geochemical parameters of gas samples from different depths and the analysis of geological settings,this research covers the diverse origins of natural gas in different strata.The gas components are mainly methane with a small amount of C_(2+),and non-hydrocarbon gases,including nitrogen(N_(2)),hydrogen(H_(2)),carbon dioxide(CO_(2)),and helium(He).At greater depth,the carbon isotope of methane becomes heavier,and the hydrogen isotope points to a lacustrine sedimentary environment.With increasing depth,the origins of N_(2)and CO_(2)change gradually from a mixture of organic and inorganic to inorganic.The origins of hydrogen gas are complex and include organic sources,water radiolysis,water-rock(Fe^(2+)-containing minerals)reactions,and mantle-derived.The shales of Denglouku and Shahezi Formations,as source rocks,provide the premise for generation and occurrence of organic gas.Furthermore,the deep faults and fluid activities in Basement Formation control the generation and migration of mantle-derived gas.The discovery of a high content of H_(2)in study area not only reveals the organic and inorganic association of natural-gas generation,but also provides a scientific basis for the exploration of deep hydrogen-rich gas.
基金supported by the National Key Research and Development Program of China(2022YFD1200300)the Central Plain Scholar Program,China(234000510004)the National Supercomputing Center in Zhengzhou,China。
文摘Cotton fiber quality is a persistent concern that determines planting benefits and the quality of finished textile products.However,the limitations of measurement instruments have hindered the accurate evaluation of some important fiber characteristics such as fiber maturity,fineness,and neps,which in turn has impeded the genetic improvement and industrial utilization of cotton fiber.Here,12 single fiber quality traits were measured using Advanced Fiber Information System(AFIS)equipment among 383 accessions of upland cotton(Gossypium hirsutum L.).In addition,eight conventional fiber quality traits were assessed by the High Volume Instrument(HVI)System.Genome-wide association study(GWAS),linkage disequilibrium(LD)block genotyping and functional identification were conducted sequentially to uncover the associated elite loci and candidate genes of fiber quality traits.As a result,the previously reported pleiotropic locus FL_D11 regulating fiber length-related traits was identified in this study.More importantly,three novel pleiotropic loci(FM_A03,FF_A05,and FN_A07)regulating fiber maturity,fineness and neps,respectively,were detected based on AFIS traits.Numerous highly promising candidate genes were screened out by integrating RNA-seq and qRT-PCR analyses,including the reported GhKRP6 for fiber length,the newly identified GhMAP8 for maturity and GhDFR for fineness.The origin and evolutionary analysis of pleiotropic loci indicated that the selection pressure on FL_D11,FM_A03 and FF_A05 increased as the breeding period approached the present and the origins of FM_A03 and FF_A05 were traced back to cotton landraces.These findings reveal the genetic basis underlying fiber quality and provide insight into the genetic improvement and textile utilization of fiber in G.hirsutum.
基金partly supported by the National Natural Science Foundation of China(Jianhua Wu,Grant No.62041106).
文摘Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications.
基金supported by the National Key R&D Program of China(Grant Number 2021YFB2700900)the National Natural Science Foundation of China(Grant Numbers 62172232,62172233)the Jiangsu Basic Research Program Natural Science Foundation(Grant Number BK20200039).
文摘Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
基金funded by National Science Council,Taiwan,the Grant Number is NSC 111-2410-H-167-005-MY2.
文摘Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases.
基金financially supported by the Agricultural Science and Technology Innovation Program(CAASASTIP-2021-RIP-02)。
文摘Identification of the S genotype of Malus plants will greatly promote the discovery of new genes,the cultivation and production of apple,the breeding of new varieties,and the origin and evolution of self-incompatibility in Malus plants.In this experiment,88 Malus germplasm resources,such as Aihuahong,Xishuhaitang,and Reguanzi,were used as materials.Seven gene-specific primer combinations were used in the genotype identification.PCR amplification using leaf DNA produced a single S-RNase gene fragment in all materials.The results revealed that 70 of the identified materials obtained a complete S-RNase genotype,while only one S-RNase gene was found in 18 of them.Through homology comparison and analysis,13 S-RNase genotypes were obtained:S_(1)S_(2)(Aihuahong,etc.),S_(1)S_(28)(Xixian Haitang,etc.),S_(1)S_(51)(Hebei Pingdinghaitang),S_(1)S_(3)(Xiangyangcun Daguo,etc.),S_(2)S_(3)(Zhaiyehaitang,etc.),S_(3)S_(51)(Xishan 1),S_(3)S_(28)(Huangselihaerde,etc.),S_(2)S_(28)(Honghaitang,etc.),S_(4)S_(28)(Bo 11),S_(7)S_(28)(Jiuquan Shaguo),S_(10)S_e(Dongchengguan 13),S_(10)S_(21)(Dongxiangjiao)and S_(3)S_(51)(Xiongyue Haitang).Simultaneously,the frequency of the S gene in the tested materials was analyzed.The findings revealed that different S genes had varying frequencies in Malus resources,as well as varying frequencies between intraspecific and interspecific.S_(3) had the highest frequency of 68.18%,followed by S_(1)(42.04%).In addition,the phylogenetic tree and origin evolution analysis revealed that the S gene differentiation was completed prior to the formation of various apple species,that cultivated species also evolved new S genes,and that the S_(50) gene is the oldest S allele in Malus plants.The S_(1),S_(29),and S_(33) genes in apple-cultivated species,on the other hand,may have originated in M.sieversii,M.hupehensis,and M.kansuensis,respectively.In addition to M.sieversii,M.kansuensis and M.sikkimensis may have also played a role in the origin and evolution of some Chinese apples.
基金This work was supported by the Scientific Research Foundation for High Level Talents of Qingdao Agricultural University,China(665-1120015)the National Program for Quality and Safety Risk Assessment of Agricultural Products of China(GJFP2019011)the National Natural Science Foundation of China(42207017).
文摘Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits.
基金the National Natural Science Foundation of China(Grant Numbers 622724786210245062102451).
文摘With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.
文摘BACKGROUND Retroperitoneal high-grade serous carcinoma(HGSC)of unknown origin is a sporadic tumor that can originate from ovarian cancer.Herein,we report the case of a woman with retroperitoneal HGSC of unknown origin and describe how she was diagnosed and treated.CASE SUMMARY A 71-year-old female presented with the tumor marker CA125 elevated to 1041.9 U/mL upon a regular health examination.Computed tomography revealed retroperitoneal lymph node enlargement.Subsequently,positron emission tomography scanning revealed lesions with increased F-18 fluorodeoxyglucose uptake at the nodes.As a result,she underwent laparoscopic lymph node resection,and pathology revealed metastatic adenocarcinoma with CK7(+),PAX8(+),WT1(+),PR(-),and p53 mutational loss of expression,indicating that the origin may be from the adnexa.The patient was admitted to our ward and underwent laparoscopic staging;however,the pathological results were negative.Under the suspicion of retroperitoneal HGSC of unknown origin,chemotherapy and targeted therapy were initiated.Tumor marker levels decreased after treatment.CONCLUSION We present a case of HGSC of unknown origin managed using retroperitoneal lymphadenectomy,staging surgery,chemotherapy,and targeted therapy.
基金Support for this study was received from Orient Resources Ltd.in Canada,Wuhan Institute of Technology,China,and College of Earth Sciences,Jilin University,China.
文摘By studying the light isotopic compositions of carbon,oxygen,and hydrogen,combined with previous research results on the ore-forming source of the deposit,the authors try to uncover its metallogenic origin.The δ^(18)O and δ^(13)C isotope signatures of dolomite samples vary between 10.2 and 13.0‰,and between−7.2 and−5.2‰,respectively,implying that the carbon derives from the upper mantle.δD and δ^(18) O of quartz,biotite,and muscovite from diff erent ore veins of the deposit vary between−82 and−59‰,and between 11.6 and 12.4‰,respectively,implying that the metallogenic solutions are mainly magmatic.According to the relevant research results of many isotope geologists,the fractionation degree of hydrogen isotopes increases as the depth to the Earth’s core increases,and the more diff erentiated the hydrogen isotopes are,the lower their values will be.In other words,mantle-derived solutions can have extremely low hydrogen isotope values.This means that the δD‰ value−134 of the pyrrhotite sample numbered SD-34 in this article may indicate mantle-derived oreforming fl uid of the deposit.The formation of the Dashuigou tellurium deposit occurred between 91.71 and 80.19 Ma.
文摘Anomalous origin of the left coronary artery (AOLCA) from the right sinus of Valsalva constitutes a rare congenital coronary artery anomaly. Patients with an anomalous left main coronary artery face a significantly higher risk of sudden cardiac death compared to those with an anomalous right coronary artery. The anomalous coronary artery traversing between the ascending aorta and the pulmonary artery markedly heightens the risk of myocardial ischemia, arrhythmia, and sudden death. Symptomatic patients often exhibit a longer intramural course of the coronary artery, which may necessitate earlier intervention or influence the choice of surgical repair method. Surgical intervention is advocated for patients with this anomaly, even in the absence of symptoms. For anomalous aortic origin of a coronary artery from the opposite sinus of Valsalva with an intramural course, coronary unroofing is the preferred revascularization procedure. This report presents a case of AOLCA originating from the right sinus of Valsalva, treated surgically using the unroofing technique for the aortic intramural segment of the anomalous coronary artery traversing between the great vessels. The unroofing technique is recommended for treating AOLCA with an extensive intramural course that does not involve the commissure.
文摘[Objectives]This study was conducted to clarify the difference of millet from different producing areas in near-infrared spectroscopy(NIRS)modeling.[Methods]Millet samples from six different regions were collected for NIRS analysis,and an origin identification model based on BP neural network was established.The competitive adaptive reweighted sampling(CARS)algorithm was used to extract characteristic wavelength variables,and a CARS-BP model was established on this basis.Finally,the CARS-BP model was compared with support vector machine(SVM),partial least squares discriminant analysis(PLS)and KNN models.[Results]The characteristic wavelengths were extracted by CARS,and the number of variables was reduced from 1845 to 130.The discrimination accuracy of the CARS-BP model for the samples from six producing areas reached 98.1%,which was better than SVM,PSL and KNN models.[Conclusions]NIRS can quickly and accurately identify the origin of millet,providing a new method and way for the origin identification and quality evaluation of millet.
文摘Humans across cultures convey feelings and thoughts through music.Despite its ubiquity,the origins and evolution of music remain enigmatic.Archaeological evidence has traced the history of music back at least 40000 years ago based on prehistoric bone flutes(Fitch,2006).Comparative studies have also explored earlier histories by identifying common musical features between animals and humans(Fitch,2006).For example,songbirds exhibit categorical rhythms similar to human music(Roeske et al.,2020),and humans can recognize emotional arousal in signals across all classes of terrestrial vertebrates(Filippi et al.,2017).These findings,while surprising,align with the longstanding human perception of animal signals as music(Gray et al.,2001).The universality of music and its features intensifies the fundamental question posed by Darwin(1871):how has a behavior that is energetically costly and seemingly non-adaptive evolved to become so widespread?This question can be further divided into two sub-questions(Savage et al.,2021):(1)how do musical features contribute to the production or expressive power of music(i.e.,mechanisms),and(2)how does music benefit performers in terms of survival,reproductions,or other aspects(i.e.,functions).
基金funded by Revision and Key Technical Research on Railway Technical Management Regulation(P2023B001).
文摘Purpose–To facilitate technical managers and field workers to master and understand the provisions of Technical Management Regulations for Railway more accurately,so as to better serve the comprehensive revision of the Regulations,this paper carries out the research on the traceability and evolution of the provisions of the Regulations.Design/methodology/approach–This paper studies and analyzes the evolution of the 11th edition of the Regulations by analyzing the relevance of clauses and summarizes the historical background of the development of calendar editions of the Regulations.The basic research on the traceability and evolution of the Regulations is carried out from four aspects:the continuity of the development of the Regulations,the authority of contents,the relevance of clauses and the richness of historical materials.Findings–From the first edition of the Regulations issued by the former Ministry of Railways in 1950 to the 11th edition,there have been ten comprehensive revisions.There is a strong correlation and continuity between the calendar editions of the Regulations in terms of chapter structure and clauses.Studying the context of the terms of the Regulations is an important way to understand and master the current clauses of the Regulations.Originality/value–Through the research on the traceability and evolution of the clauses of the Regulations,one is to explore the context of the development of railway technical equipment in China,the other is to clarify the historical background when the provisions were formulated and the third is to trace the development and evolution of the provisions.The revision of the Regulations is based on an accurate grasp of the context of the provisions,which can effectively judge the possible security risks caused by the revision of the provisions and avoid the possible risks in field implementation from the source.