AIM: To study the selective killing of human umbilical vein endothelial cells (HUVECs) by a double suicide gene under the regulation of a kinase domain insert containing receptor (KDR) promoter and mediated by an...AIM: To study the selective killing of human umbilical vein endothelial cells (HUVECs) by a double suicide gene under the regulation of a kinase domain insert containing receptor (KDR) promoter and mediated by an adenoviral gene vector. METHODS: Human KDR promoter was cloned by polymerase chain reaction (PCR), and two recombinant adenoviral plasmids pAdKDR-CdgIyTK, pAdCMV-CDglyTK were constructed according to a two-step transformation protocol. These two newly constructed plasmids were then transfected into 293 packaging cells to grow adenovirus, which were further multiplied and purified. HUVECs and LoVo cells were infected with either of the two resultant recombinant adenoviruses (AdKDR-CDglyTK and AdCMV-CDglyTK) respectively, and the infection rates were estimated by detection of green fluorescent protein (GFP) expression. Infected cells were cultured in culture media containing different concentrations of 5-fiuoroo/tosine (5-FC) and ganciclovir (GCV), and the killing effects were measured. RESULTS: The two recombinant adenoviral plasmids pAdKDR-CdglyTK, pAdCMV-CDglyTK were successfully constructed and transfected into 293 cells. The resultant recombinant adenoviruses infected cells caused similar infection rates; and the infected cells exhibited different sensitivity to the prodrugs: HUVECs infected with AdCMV-CDglyTK and LoVo cells infected with AdCMVo CDglyTK were highly sensitive to the prodrugs, and HUVECs infected with AdKDR-CDglyTK were similarly sensitive but significantly more sensitive than the LoVo cells infected with AdKDR-CdglyTK (P 〈 0.001). CONCLUSION: Selective killing of HUVECs may be achieved by gene transfer of double suicide gene under the regulation of the KDR promoter. This finding may provide an optional way to target gene therapy of malignant tumors by abrogation of tumor blood vessels.展开更多
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v...Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</su...When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
Objective:To investigate the inhibitory effect of curcumin on influenza virus HIN1 and H3N2 in vitro, Methods:The directly killing role of cureumin extract in vitro to influenza virus type A subtype H1N1 and H3N2 wa...Objective:To investigate the inhibitory effect of curcumin on influenza virus HIN1 and H3N2 in vitro, Methods:The directly killing role of cureumin extract in vitro to influenza virus type A subtype H1N1 and H3N2 was evaluated by the canine kidney cells (MDCK), Results:The largest non toxic concentration of curcumin extract was 12, 5g/L and the effective inhibitory concentration to H1N1 and H3N2 was 6, 25G/1 AND 1,56g/L respectively, Conclusion: Curcumin extract have directly killing effect on H1N1 and H3N2 infections.展开更多
Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 we...Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 were used to induce CD3AK cells, and IL-2 was used to induce LAK cells; IFN-γ was used in the beginning, then IL-1, CD3mAb and IL-2 were used to induce CIK cells after 24 h for observing amplification and analyzing their relationship. The phenotypes of the cultured CIK cells were analyzed by flow cytometry. Subsequently, by using MGC-803 gastric cancer cell strain as target cells, the killing activity of CD3AK, LAK and CIK cells was evaluated by using MTT method. Results: The amplification activity of CD3AK and CIK cells was all far higher than LAK cells (P〈0.05). The amplification activity had no obvious difference between CIK cells and CD3AK cells at prophase, but that was far higher in CIK cells than CD3AK cells at about 20^th day (P〈0.05). The flow cytometry revealed that the amount of CD3^+ CD56^+ cells, major effector cells after CIK cells being cultured was significantly increased (P〈0.05), moreover, the amount of CD8^+ cells was significantly increased as well (P〈0.05). The killing activities of CD3AK and CIK cells to the MGC-803 gastric cancer cell strain were all significantly higher than LAK cells, while the killing activity of CIK cells was stronger than CD3AK cells (P〈0.05). Conclusion: CIK cells have stronger amplification activity and killing activity, and can be taken as more effective killing cells applied to the tumor adoptive immunotherapy.展开更多
基金Supported by the Natural Science Foundation of Guangdong Province,No.013072the 863 Program Funds,No.2001AA 217171
文摘AIM: To study the selective killing of human umbilical vein endothelial cells (HUVECs) by a double suicide gene under the regulation of a kinase domain insert containing receptor (KDR) promoter and mediated by an adenoviral gene vector. METHODS: Human KDR promoter was cloned by polymerase chain reaction (PCR), and two recombinant adenoviral plasmids pAdKDR-CdgIyTK, pAdCMV-CDglyTK were constructed according to a two-step transformation protocol. These two newly constructed plasmids were then transfected into 293 packaging cells to grow adenovirus, which were further multiplied and purified. HUVECs and LoVo cells were infected with either of the two resultant recombinant adenoviruses (AdKDR-CDglyTK and AdCMV-CDglyTK) respectively, and the infection rates were estimated by detection of green fluorescent protein (GFP) expression. Infected cells were cultured in culture media containing different concentrations of 5-fiuoroo/tosine (5-FC) and ganciclovir (GCV), and the killing effects were measured. RESULTS: The two recombinant adenoviral plasmids pAdKDR-CdglyTK, pAdCMV-CDglyTK were successfully constructed and transfected into 293 cells. The resultant recombinant adenoviruses infected cells caused similar infection rates; and the infected cells exhibited different sensitivity to the prodrugs: HUVECs infected with AdCMV-CDglyTK and LoVo cells infected with AdCMVo CDglyTK were highly sensitive to the prodrugs, and HUVECs infected with AdKDR-CDglyTK were similarly sensitive but significantly more sensitive than the LoVo cells infected with AdKDR-CdglyTK (P 〈 0.001). CONCLUSION: Selective killing of HUVECs may be achieved by gene transfer of double suicide gene under the regulation of the KDR promoter. This finding may provide an optional way to target gene therapy of malignant tumors by abrogation of tumor blood vessels.
基金National Natural Science Foundation of China(Grant Nos.62005276,62175234)the Scientific and Technological Development Program of Jilin,China(Grant No.20230508111RC)to provide fund for this research。
文摘Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
文摘Objective:To investigate the inhibitory effect of curcumin on influenza virus HIN1 and H3N2 in vitro, Methods:The directly killing role of cureumin extract in vitro to influenza virus type A subtype H1N1 and H3N2 was evaluated by the canine kidney cells (MDCK), Results:The largest non toxic concentration of curcumin extract was 12, 5g/L and the effective inhibitory concentration to H1N1 and H3N2 was 6, 25G/1 AND 1,56g/L respectively, Conclusion: Curcumin extract have directly killing effect on H1N1 and H3N2 infections.
文摘Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 were used to induce CD3AK cells, and IL-2 was used to induce LAK cells; IFN-γ was used in the beginning, then IL-1, CD3mAb and IL-2 were used to induce CIK cells after 24 h for observing amplification and analyzing their relationship. The phenotypes of the cultured CIK cells were analyzed by flow cytometry. Subsequently, by using MGC-803 gastric cancer cell strain as target cells, the killing activity of CD3AK, LAK and CIK cells was evaluated by using MTT method. Results: The amplification activity of CD3AK and CIK cells was all far higher than LAK cells (P〈0.05). The amplification activity had no obvious difference between CIK cells and CD3AK cells at prophase, but that was far higher in CIK cells than CD3AK cells at about 20^th day (P〈0.05). The flow cytometry revealed that the amount of CD3^+ CD56^+ cells, major effector cells after CIK cells being cultured was significantly increased (P〈0.05), moreover, the amount of CD8^+ cells was significantly increased as well (P〈0.05). The killing activities of CD3AK and CIK cells to the MGC-803 gastric cancer cell strain were all significantly higher than LAK cells, while the killing activity of CIK cells was stronger than CD3AK cells (P〈0.05). Conclusion: CIK cells have stronger amplification activity and killing activity, and can be taken as more effective killing cells applied to the tumor adoptive immunotherapy.