Acupuncture is widely used to treat functional dyspepsia with satisfactory outcomes. Combination of the He and Mu acupoints is commonly used and has a synergistic effect on functional dyspepsia; however, its underlyin...Acupuncture is widely used to treat functional dyspepsia with satisfactory outcomes. Combination of the He and Mu acupoints is commonly used and has a synergistic effect on functional dyspepsia; however, its underlying mechanisms remain unclear. Therefore, a randomized controlled parallel clinical trial is currently underway at Chengdu University of Traditional Chinese Medicine, China. This trial is designed to explore the efficacy of and central responses to the He-Mu point combination in patients with functional dyspepsia using functional magnetic resonance imaging. A total of 105 patients with functional dyspepsia will be allocated into 3 groups: the low-He point group(puncturing at Zusanli(ST36)), Mu point group(puncturing at Zhongwan(CV12)), and He-Mu point combination group(puncturing at ST36 and CV12). Every participant will receive 20 sessions of manual acupuncture for 4 weeks. The needles will be inserted perpendicularly to a depth of 1 to 2 cun. The angle of rotation and twisting will range from 90 to 180 degrees, while lifting and thrusting will range from 0.3 to 0.5 cm. The various manipulations will be performed 60 to 90 times per minute. The needles will remain in place for 30 minutes, during which manipulation will be applied every 10 minutes. Magnetic resonance imaging will be performed before and after 20 sessions of acupuncture. The primary outcome is symptom improvement according to the Chinese version of the Nepean Dyspepsia Index. Secondary outcomes include the Leeds dyspepsia questionnaire, Self-Rating Anxiety Scale, Self-Rating Depression Scale, Beck Anxiety Inventory, Beck Depression Inventory, and visual analogue scale scores before and after 10 and 20 sessions of acupuncture. Needle sensation and adverse events will be used to assess the therapeutic effects. This study will promote more widespread awareness of the benefits of acupoint combination in the clinical setting and provide a further explanation of the neuromechanism by which acupuncture at the He-Mu point combination for functional dyspepsia. Registration: Chinese Clinical Trial Registry, Chi CTR-IOR-15006402.展开更多
Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in ...Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.展开更多
The selection of a starter is a complex process, involving different steps, like a preliminary characterization under laboratory conditions, the selection of the most promising strains, a lab validation and the final ...The selection of a starter is a complex process, involving different steps, like a preliminary characterization under laboratory conditions, the selection of the most promising strains, a lab validation and the final validation in a large-scale fermentation;the selection of a functional starter includes a further step, dealing with the assessment of the functional traits. This paper proposes a case study on how use a step-by-step approach, based on some rapid protocols, to select promising starter cultures with probiotic abilities. Nine strains, isolated from a commercial preparation, were studied in relation to some enzymatic activities (slime and acetoin production, reduction of nitrates, proteolytic activity and hydrolysis of tributyrin), technological (acidification and growth at different temperatures, pHs and salt amounts) and probiotic traits (hydrophobicity, co-aggregation towards Salmonella sp. and Escherichia coli, survival at pH 2.5 and in presence of bile salts, antibiotic resistance) and compared to some collection isolates. As a final step, a multivariate approach was used to select the most promising isolates. The isolates from the commercial preparation were able to perform the fermentation (e.g. acidification) at low temperatures with some interesting traits in terms of bioactivity towards E. coli O157:H7, whilst some interesting probiotic traits in terms of hydrophobicity and survival in conditions that mimicked the gut were found for the collection isolates.展开更多
The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most...The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most effective methods to ensure the security in the RFID system. Many light-weight authentication protocols use Hash function and pseudorandom generator to ensure the anonymity and confidential communication of the RFID system. But these protocols do not provide such security as they claimed. By analyzing some typical Hash-based RFID authentication protocols, it is found that they are vulnerable to some common attacks. Many protocols cannot resist tracing attack and de-synchronization attack. Some protocols cannot provide forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based authentication protocol and they claimed their protocol could resist the well-known attacks. But by constructing some different attack scenarios, their protocol is shown to be vulnerable to tracing attack and de-synchronization attack. Based on the analysis for the Hash-based authentication protocols, some feasible suggestions are proposed to improve the security of the RFID authentication protocols.展开更多
基金supported by the National Scientific Foundation Committee in China,No.81473602the Education Ministry’s New Century Excellent Talents Supporting Plan in China+3 种基金the Foundation for the Author of National Excellent Doctoral Dissertation of China,No.201486the Youth Foundation of Science and Technology Department of Sichuan Province in China,No.15QNJJ0008the National Natural Science Foundation-Excellent Youth Foundation in China,No.81622052the 2011 Co-Innovation Center of Sichuan Province named Acupoint Effects of Acupuncture Co-Innovation Center
文摘Acupuncture is widely used to treat functional dyspepsia with satisfactory outcomes. Combination of the He and Mu acupoints is commonly used and has a synergistic effect on functional dyspepsia; however, its underlying mechanisms remain unclear. Therefore, a randomized controlled parallel clinical trial is currently underway at Chengdu University of Traditional Chinese Medicine, China. This trial is designed to explore the efficacy of and central responses to the He-Mu point combination in patients with functional dyspepsia using functional magnetic resonance imaging. A total of 105 patients with functional dyspepsia will be allocated into 3 groups: the low-He point group(puncturing at Zusanli(ST36)), Mu point group(puncturing at Zhongwan(CV12)), and He-Mu point combination group(puncturing at ST36 and CV12). Every participant will receive 20 sessions of manual acupuncture for 4 weeks. The needles will be inserted perpendicularly to a depth of 1 to 2 cun. The angle of rotation and twisting will range from 90 to 180 degrees, while lifting and thrusting will range from 0.3 to 0.5 cm. The various manipulations will be performed 60 to 90 times per minute. The needles will remain in place for 30 minutes, during which manipulation will be applied every 10 minutes. Magnetic resonance imaging will be performed before and after 20 sessions of acupuncture. The primary outcome is symptom improvement according to the Chinese version of the Nepean Dyspepsia Index. Secondary outcomes include the Leeds dyspepsia questionnaire, Self-Rating Anxiety Scale, Self-Rating Depression Scale, Beck Anxiety Inventory, Beck Depression Inventory, and visual analogue scale scores before and after 10 and 20 sessions of acupuncture. Needle sensation and adverse events will be used to assess the therapeutic effects. This study will promote more widespread awareness of the benefits of acupoint combination in the clinical setting and provide a further explanation of the neuromechanism by which acupuncture at the He-Mu point combination for functional dyspepsia. Registration: Chinese Clinical Trial Registry, Chi CTR-IOR-15006402.
基金Supported by the National Natural Science Foun-dation of China(60473072)
文摘Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.
文摘The selection of a starter is a complex process, involving different steps, like a preliminary characterization under laboratory conditions, the selection of the most promising strains, a lab validation and the final validation in a large-scale fermentation;the selection of a functional starter includes a further step, dealing with the assessment of the functional traits. This paper proposes a case study on how use a step-by-step approach, based on some rapid protocols, to select promising starter cultures with probiotic abilities. Nine strains, isolated from a commercial preparation, were studied in relation to some enzymatic activities (slime and acetoin production, reduction of nitrates, proteolytic activity and hydrolysis of tributyrin), technological (acidification and growth at different temperatures, pHs and salt amounts) and probiotic traits (hydrophobicity, co-aggregation towards Salmonella sp. and Escherichia coli, survival at pH 2.5 and in presence of bile salts, antibiotic resistance) and compared to some collection isolates. As a final step, a multivariate approach was used to select the most promising isolates. The isolates from the commercial preparation were able to perform the fermentation (e.g. acidification) at low temperatures with some interesting traits in terms of bioactivity towards E. coli O157:H7, whilst some interesting probiotic traits in terms of hydrophobicity and survival in conditions that mimicked the gut were found for the collection isolates.
文摘The low-cost RFID tags have very limited computing and storage resources and this makes it difficult to completely solve their security and privacy problems. Lightweight authentication is considered as one of the most effective methods to ensure the security in the RFID system. Many light-weight authentication protocols use Hash function and pseudorandom generator to ensure the anonymity and confidential communication of the RFID system. But these protocols do not provide such security as they claimed. By analyzing some typical Hash-based RFID authentication protocols, it is found that they are vulnerable to some common attacks. Many protocols cannot resist tracing attack and de-synchronization attack. Some protocols cannot provide forward security. Gy?z? Gódor and Sándor Imre proposed a Hash-based authentication protocol and they claimed their protocol could resist the well-known attacks. But by constructing some different attack scenarios, their protocol is shown to be vulnerable to tracing attack and de-synchronization attack. Based on the analysis for the Hash-based authentication protocols, some feasible suggestions are proposed to improve the security of the RFID authentication protocols.