With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex...With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.展开更多
Through combined applications of the transfer-matrix method and asymptotic expansion technique,we formulate a theory to predict the three-dimensional response of micropolar plates.No ad hoc assumptions regarding throu...Through combined applications of the transfer-matrix method and asymptotic expansion technique,we formulate a theory to predict the three-dimensional response of micropolar plates.No ad hoc assumptions regarding through-thickness assumptions of the field variables are made,and the governing equations are two-dimensional,with the displacements and microrotations of the mid-plane as the unknowns.Once the deformation of the mid-plane is solved,a three-dimensional micropolar elastic field within the plate is generated,which is exact up to the second order except in the boundary region close to the plate edge.As an illustrative example,the bending of a clamped infinitely long plate caused by a uniformly distributed transverse force is analyzed and discussed in detail.展开更多
BACKGROUND Biliary stone disease is a highly prevalent condition and a leading cause of hospitalization worldwide.Hepatolithiasis with associated strictures has high residual and recurrence rates after traditional mul...BACKGROUND Biliary stone disease is a highly prevalent condition and a leading cause of hospitalization worldwide.Hepatolithiasis with associated strictures has high residual and recurrence rates after traditional multisession percutaneous transhepatic cholangioscopic lithotripsy(PTCSL).AIM To study one-step PTCSL using the percutaneous transhepatic one-step biliary fistulation(PTOBF)technique guided by three-dimensional(3D)visualization.METHODS This was a retrospective,single-center study analyzing,140 patients who,between October 2016 and October 2023,underwent one-step PTCSL for hepatolithiasis.The patients were divided into two groups:The 3D-PTOBF group and the PTOBF group.Stone clearance on choledochoscopy,complications,and long-term clearance and recurrence rates were assessed.RESULTS Age,total bilirubin,direct bilirubin,Child-Pugh class,and stone location were similar between the 2 groups,but there was a significant difference in bile duct strictures,with biliary strictures more common in the 3D-PTOBF group(P=0.001).The median follow-up time was 55.0(55.0,512.0)days.The immediate stone clearance ratio(88.6%vs 27.1%,P=0.000)and stricture resolution ratio(97.1%vs 78.6%,P=0.001)in the 3D-PTOBF group were significantly greater than those in the PTOBF group.Postoperative complication(8.6%vs 41.4%,P=0.000)and stone recurrence rates(7.1%vs 38.6%,P=0.000)were significantly lower in the 3D-PTOBF group.CONCLUSION Three-dimensional visualization helps make one-step PTCSL a safe,effective,and promising treatment for patients with complicated primary hepatolithiasis.The perioperative and long-term outcomes are satisfactory for patients with complicated primary hepatolithiasis.This minimally invasive method has the potential to be used as a substitute for hepatobiliary surgery.展开更多
Hypoxia is a typical feature of the tumor microenvironment,one of the most critical factors affecting cell behavior and tumor progression.However,the lack of tumor models able to precisely emulate natural brain tumor ...Hypoxia is a typical feature of the tumor microenvironment,one of the most critical factors affecting cell behavior and tumor progression.However,the lack of tumor models able to precisely emulate natural brain tumor tissue has impeded the study of the effects of hypoxia on the progression and growth of tumor cells.This study reports a three-dimensional(3D)brain tumor model obtained by encapsulating U87MG(U87)cells in a hydrogel containing type I collagen.It also documents the effect of various oxygen concentrations(1%,7%,and 21%)in the culture environment on U87 cell morphology,proliferation,viability,cell cycle,apoptosis rate,and migration.Finally,it compares two-dimensional(2D)and 3D cultures.For comparison purposes,cells cultured in flat culture dishes were used as the control(2D model).Cells cultured in the 3D model proliferated more slowly but had a higher apoptosis rate and proportion of cells in the resting phase(G0 phase)/gap I phase(G1 phase)than those cultured in the 2D model.Besides,the two models yielded significantly different cell morphologies.Finally,hypoxia(e.g.,1%O2)affected cell morphology,slowed cell growth,reduced cell viability,and increased the apoptosis rate in the 3D model.These results indicate that the constructed 3D model is effective for investigating the effects of biological and chemical factors on cell morphology and function,and can be more representative of the tumor microenvironment than 2D culture systems.The developed 3D glioblastoma tumor model is equally applicable to other studies in pharmacology and pathology.展开更多
Liver regeneration and the development of effective therapies for liver failure remain formidable challenges in modern medicine.In recent years,the utilization of 3D cell-based strategies has emerged as a promising ap...Liver regeneration and the development of effective therapies for liver failure remain formidable challenges in modern medicine.In recent years,the utilization of 3D cell-based strategies has emerged as a promising approach for addressing these urgent clinical requirements.This review provides a thorough analysis of the application of 3D cell-based approaches to liver regeneration and their potential impact on patients with end-stage liver failure.Here,we discuss various 3D culture models that incorporate hepatocytes and stem cells to restore liver function and ameliorate the consequences of liver failure.Furthermore,we explored the challenges in transitioning these innovative strategies from preclinical studies to clinical applications.The collective insights presented herein highlight the significance of 3D cell-based strategies as a transformative paradigm for liver regeneration and improved patient care.展开更多
The 2D limit equilibrium method is widely used for slope stability analysis.However,with the advancement of dump engineering,composite slopes often exhibit significant 3D mechanical effects.Consequently,it is of signi...The 2D limit equilibrium method is widely used for slope stability analysis.However,with the advancement of dump engineering,composite slopes often exhibit significant 3D mechanical effects.Consequently,it is of significant importance to develop an effective 3D stability calculation method for composite slopes to enhance the design and stability control of open-pit slope engineering.Using the composite slope formed by the mining stope and inner dump in Baiyinhua No.1 and No.2 open-pit coal mine as a case study,this research investigates the failure mode of composite slopes and establishes spatial shape equations for the sliding mass.By integrating the shear resistance and sliding force of each row of microstrip columns onto the bottom surface of the strip corresponding to the main sliding surface,a novel 2D equivalent physical and mechanical parameters analysis method for the strips on the main sliding surface of 3D sliding masses is proposed.Subsequently,a comprehensive 3D stability calculation method for composite slopes is developed,and the quantitative relationship between the coordinated development distance and its 3D stability coefficients is examined.The analysis reveals that the failure mode of the composite slope is characterized by cutting-bedding sliding,with the arc serving as the side interface and the weak layer as the bottom interface,while the destabilization mechanism primarily involves shear failure.The spatial form equation of the sliding mass comprises an ellipsoid and weak plane equation.The analysis revealed that when the coordinated development distance is 1500 m,the error rate between the 3D stability calculation result and the 2D stability calculation result of the composite slope is less than 8%,thereby verifying the proposed analytical method of equivalent physical and mechanical parameters and the 3D stability calculation method for composite slopes.Furthermore,the3D stability coefficient of the composite slope exhibits an exponential correlation with the coordinated development distance,with the coefficient gradually decreasing as the coordinated development distance increases.These findings provide a theoretical guideline for designing similar slope shape parameters and conducting stability analysis.展开更多
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ...China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.展开更多
Spinal cord injury is considered one of the most difficult injuries to repair and has one of the worst prognoses for injuries to the nervous system.Following surgery,the poor regenerative capacity of nerve cells and t...Spinal cord injury is considered one of the most difficult injuries to repair and has one of the worst prognoses for injuries to the nervous system.Following surgery,the poor regenerative capacity of nerve cells and the generation of new scars can make it very difficult for the impaired nervous system to restore its neural functionality.Traditional treatments can only alleviate secondary injuries but cannot fundamentally repair the spinal cord.Consequently,there is a critical need to develop new treatments to promote functional repair after spinal cord injury.Over recent years,there have been seve ral developments in the use of stem cell therapy for the treatment of spinal cord injury.Alongside significant developments in the field of tissue engineering,three-dimensional bioprinting technology has become a hot research topic due to its ability to accurately print complex structures.This led to the loading of three-dimensional bioprinting scaffolds which provided precise cell localization.These three-dimensional bioprinting scaffolds co uld repair damaged neural circuits and had the potential to repair the damaged spinal cord.In this review,we discuss the mechanisms underlying simple stem cell therapy,the application of different types of stem cells for the treatment of spinal cord injury,and the different manufa cturing methods for three-dimensional bioprinting scaffolds.In particular,we focus on the development of three-dimensional bioprinting scaffolds for the treatment of spinal cord injury.展开更多
BACKGROUND Diabetic cardiomyopathy is considered as a chronic complication of diabetes mellitus(DM).Therefore,early detection of left ventricular systolic function(LVSF)damage in DM is essential.AIM To explore the use...BACKGROUND Diabetic cardiomyopathy is considered as a chronic complication of diabetes mellitus(DM).Therefore,early detection of left ventricular systolic function(LVSF)damage in DM is essential.AIM To explore the use of the three-dimensional speckle tracking technique(3D-STI)for measuring LVSF in DM patients via meta-analysis.METHODS The electronic databases were retrieved from the initial accessible time to 29 April 2023.The current study involved 9 studies,including 970 subjects.We carried out this meta-analysis to estimate myocardial function in DM compared with controls according to myocardial strain attained by 3D-STI.RESULTS Night articles including 970 subjects were included.No significant difference was detected in the left ventricular ejection fraction between the control and the diabetic group(P>0.05),while differences in global longitudinal strain,global circumferential strain,global radial strain,and global area strain were markedly different between the controls and DM patients(all P<0.05).CONCLUSION The 3D-STI could be applied to accurately measure early LVSF damage in patients with DM.展开更多
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r...Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.展开更多
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
In recent years,notable progress has been achieved in both the hardware and algorithms of structured illumination microscopy(SIM).Nevertheless,the advancement of three-dimensional structured illumination microscopy(3D...In recent years,notable progress has been achieved in both the hardware and algorithms of structured illumination microscopy(SIM).Nevertheless,the advancement of three-dimensional structured illumination microscopy(3DSIM)has been impeded by challenges arising from the speed and intricacy of polarization modulation.We introduce a high-speed modulation 3DSIM system,leveraging the polarizationmaintaining and modulation capabilities of a digital micromirror device(DMD)in conjunction with an electrooptic modulator.The DMD-3DSIM system yields a twofold enhancement in both lateral(133 nm)and axial(300 nm)resolution compared to wide-field imaging and can acquire a data set comprising 29 sections of 1024 pixels×1024 pixels,with 15 ms exposure time and 6.75 s per volume.The versatility of the DMD-3DSIM approach was exemplified through the imaging of various specimens,including fluorescent beads,nuclear pores,microtubules,actin filaments,and mitochondria within cells,as well as plant and animal tissues.Notably,polarized 3DSIM elucidated the orientation of actin filaments.Furthermore,the implementation of diverse deconvolution algorithms further enhances 3D resolution.The DMD-based 3DSIM system presents a rapid and reliable methodology for investigating biomedical phenomena,boasting capabilities encompassing 3D superresolution,fast temporal resolution,and polarization imaging.展开更多
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s...Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformatio...We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
A toroidal soft x-ray imaging(T-SXRI)system has been developed to investigate threedimensional(3D)plasma physics on J-TEXT.This T-SXRI system consists of three sets of SXR arrays.Two sets are newly developed and locat...A toroidal soft x-ray imaging(T-SXRI)system has been developed to investigate threedimensional(3D)plasma physics on J-TEXT.This T-SXRI system consists of three sets of SXR arrays.Two sets are newly developed and located on the vacuum chamber wall at toroidal positionsφof 126.4°and 272.6°,respectively,while one set was established previously atφ=65.50.Each set of SXR arrays consists of three arrays viewing the plasma poloidally,and hence can be used separately to obtain SXR images via the tomographic method.The sawtooth precursor oscillations are measured by T-SXRI,and the corresponding images of perturbative SXR signals are successfully reconstructed at these three toroidal positions,hence providing measurement of the 3D structure of precursor oscillations.The observed 3D structure is consistent with the helical structure of the m/n=1/1 mode.The experimental observation confirms that the T-SXRI system is able to observe 3D structures in the J-TEXT plasma.展开更多
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ...Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste.展开更多
BACKGROUND Acetabular component positioning in total hip arthroplasty(THA)is of key importance to ensure satisfactory post-operative outcomes and to minimize the risk of complications.The majority of acetabular compon...BACKGROUND Acetabular component positioning in total hip arthroplasty(THA)is of key importance to ensure satisfactory post-operative outcomes and to minimize the risk of complications.The majority of acetabular components are aligned freehand,without the use of navigation methods.Patient specific instruments(PSI)and three-dimensional(3D)printing of THA placement guides are increasingly used in primary THA to ensure optimal positioning.AIM To summarize the literature on 3D printing in THA and how they improve acetabular component alignment.METHODS PubMed was used to identify and access scientific studies reporting on different 3D printing methods used in THA.Eight studies with 236 hips in 228 patients were included.The studies could be divided into two main categories;3D printed models and 3D printed guides.RESULTS 3D printing in THA helped improve preoperative cup size planning and post-operative Harris hip scores between intervention and control groups(P=0.019,P=0.009).Otherwise,outcome measures were heterogeneous and thus difficult to compare.The overarching consensus between the studies is that the use of 3D guidance tools can assist in improving THA cup positioning and reduce the need for revision THA and the associated costs.CONCLUSION The implementation of 3D printing and PSI for primary THA can significantly improve the positioning accuracy of the acetabular cup component and reduce the number of complications caused by malpositioning.展开更多
文摘With the development of information networks, the problem of power security has increasingly caused many attention of people, but the simple power security defense system has been difficult to meet the current complex network environment. Aiming at this situation, by using the method of T-S fuzzy neural network model to analyze the characteristics of the data transmission in network, it has obtained corresponding threat information. By processing these threat information, it completes the construction of three-dimensional power security defense system. The paper carries on the corresponding data training methods by using T-shirt model fuzzy neural network, which has certain reference significance for the data analysis of other similar fields. At the same time, the study of building on the three-dimensional power security defense system aims to provide a theoretical reference for solving the security defense of the current complex network environment.
基金Project supported by the National Natural Science Foundation of China (No. 12072337)。
文摘Through combined applications of the transfer-matrix method and asymptotic expansion technique,we formulate a theory to predict the three-dimensional response of micropolar plates.No ad hoc assumptions regarding through-thickness assumptions of the field variables are made,and the governing equations are two-dimensional,with the displacements and microrotations of the mid-plane as the unknowns.Once the deformation of the mid-plane is solved,a three-dimensional micropolar elastic field within the plate is generated,which is exact up to the second order except in the boundary region close to the plate edge.As an illustrative example,the bending of a clamped infinitely long plate caused by a uniformly distributed transverse force is analyzed and discussed in detail.
基金Supported by The Key Medical Specialty Nurturing Program of Foshan During The 14th Five-Year Plan Period,No.FSPY145205The Medical Research Project of Foshan Health Bureau,No.20230814A010024+1 种基金The Guangzhou Science and Technology Plan Project,No.202102010251the Guangdong Science and Technology Program,No.2017ZC0222.
文摘BACKGROUND Biliary stone disease is a highly prevalent condition and a leading cause of hospitalization worldwide.Hepatolithiasis with associated strictures has high residual and recurrence rates after traditional multisession percutaneous transhepatic cholangioscopic lithotripsy(PTCSL).AIM To study one-step PTCSL using the percutaneous transhepatic one-step biliary fistulation(PTOBF)technique guided by three-dimensional(3D)visualization.METHODS This was a retrospective,single-center study analyzing,140 patients who,between October 2016 and October 2023,underwent one-step PTCSL for hepatolithiasis.The patients were divided into two groups:The 3D-PTOBF group and the PTOBF group.Stone clearance on choledochoscopy,complications,and long-term clearance and recurrence rates were assessed.RESULTS Age,total bilirubin,direct bilirubin,Child-Pugh class,and stone location were similar between the 2 groups,but there was a significant difference in bile duct strictures,with biliary strictures more common in the 3D-PTOBF group(P=0.001).The median follow-up time was 55.0(55.0,512.0)days.The immediate stone clearance ratio(88.6%vs 27.1%,P=0.000)and stricture resolution ratio(97.1%vs 78.6%,P=0.001)in the 3D-PTOBF group were significantly greater than those in the PTOBF group.Postoperative complication(8.6%vs 41.4%,P=0.000)and stone recurrence rates(7.1%vs 38.6%,P=0.000)were significantly lower in the 3D-PTOBF group.CONCLUSION Three-dimensional visualization helps make one-step PTCSL a safe,effective,and promising treatment for patients with complicated primary hepatolithiasis.The perioperative and long-term outcomes are satisfactory for patients with complicated primary hepatolithiasis.This minimally invasive method has the potential to be used as a substitute for hepatobiliary surgery.
基金supported by the National Natural Science Foundation of China (No. 52275291)the Fundamental Research Funds for the Central Universitiesthe Program for Innovation Team of Shaanxi Province,China (No. 2023-CX-TD-17)
文摘Hypoxia is a typical feature of the tumor microenvironment,one of the most critical factors affecting cell behavior and tumor progression.However,the lack of tumor models able to precisely emulate natural brain tumor tissue has impeded the study of the effects of hypoxia on the progression and growth of tumor cells.This study reports a three-dimensional(3D)brain tumor model obtained by encapsulating U87MG(U87)cells in a hydrogel containing type I collagen.It also documents the effect of various oxygen concentrations(1%,7%,and 21%)in the culture environment on U87 cell morphology,proliferation,viability,cell cycle,apoptosis rate,and migration.Finally,it compares two-dimensional(2D)and 3D cultures.For comparison purposes,cells cultured in flat culture dishes were used as the control(2D model).Cells cultured in the 3D model proliferated more slowly but had a higher apoptosis rate and proportion of cells in the resting phase(G0 phase)/gap I phase(G1 phase)than those cultured in the 2D model.Besides,the two models yielded significantly different cell morphologies.Finally,hypoxia(e.g.,1%O2)affected cell morphology,slowed cell growth,reduced cell viability,and increased the apoptosis rate in the 3D model.These results indicate that the constructed 3D model is effective for investigating the effects of biological and chemical factors on cell morphology and function,and can be more representative of the tumor microenvironment than 2D culture systems.The developed 3D glioblastoma tumor model is equally applicable to other studies in pharmacology and pathology.
基金This work was supported by grants fromthe Sichuan Science and Technology Program(2023NSFSC1877).
文摘Liver regeneration and the development of effective therapies for liver failure remain formidable challenges in modern medicine.In recent years,the utilization of 3D cell-based strategies has emerged as a promising approach for addressing these urgent clinical requirements.This review provides a thorough analysis of the application of 3D cell-based approaches to liver regeneration and their potential impact on patients with end-stage liver failure.Here,we discuss various 3D culture models that incorporate hepatocytes and stem cells to restore liver function and ameliorate the consequences of liver failure.Furthermore,we explored the challenges in transitioning these innovative strategies from preclinical studies to clinical applications.The collective insights presented herein highlight the significance of 3D cell-based strategies as a transformative paradigm for liver regeneration and improved patient care.
基金supported by the National Natural Science Foundation of China (No.52374124)National Youth Science Foundation of China (No.52204135)+3 种基金Xing Liao Talent Plan (No.XLYC2202004)Young Elite Scientists Sponsorship Program by CAST (No.2023QNRC001)Liaoning Province International Science and Technology Cooperation Plan (No.2022JH2/1070004)Liaoning Natural Science Foundation Program (No.2022-BS-327)。
文摘The 2D limit equilibrium method is widely used for slope stability analysis.However,with the advancement of dump engineering,composite slopes often exhibit significant 3D mechanical effects.Consequently,it is of significant importance to develop an effective 3D stability calculation method for composite slopes to enhance the design and stability control of open-pit slope engineering.Using the composite slope formed by the mining stope and inner dump in Baiyinhua No.1 and No.2 open-pit coal mine as a case study,this research investigates the failure mode of composite slopes and establishes spatial shape equations for the sliding mass.By integrating the shear resistance and sliding force of each row of microstrip columns onto the bottom surface of the strip corresponding to the main sliding surface,a novel 2D equivalent physical and mechanical parameters analysis method for the strips on the main sliding surface of 3D sliding masses is proposed.Subsequently,a comprehensive 3D stability calculation method for composite slopes is developed,and the quantitative relationship between the coordinated development distance and its 3D stability coefficients is examined.The analysis reveals that the failure mode of the composite slope is characterized by cutting-bedding sliding,with the arc serving as the side interface and the weak layer as the bottom interface,while the destabilization mechanism primarily involves shear failure.The spatial form equation of the sliding mass comprises an ellipsoid and weak plane equation.The analysis revealed that when the coordinated development distance is 1500 m,the error rate between the 3D stability calculation result and the 2D stability calculation result of the composite slope is less than 8%,thereby verifying the proposed analytical method of equivalent physical and mechanical parameters and the 3D stability calculation method for composite slopes.Furthermore,the3D stability coefficient of the composite slope exhibits an exponential correlation with the coordinated development distance,with the coefficient gradually decreasing as the coordinated development distance increases.These findings provide a theoretical guideline for designing similar slope shape parameters and conducting stability analysis.
基金The authors acknowledge the financial support received from the National Natural Science Foundation of China(72061147002).
文摘China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.
基金supported by the National Natural Science Foundation of China,No.82171380(to CD)Jiangsu Students’Platform for Innovation and Entrepreneurship Training Program,No.202110304098Y(to DJ)。
文摘Spinal cord injury is considered one of the most difficult injuries to repair and has one of the worst prognoses for injuries to the nervous system.Following surgery,the poor regenerative capacity of nerve cells and the generation of new scars can make it very difficult for the impaired nervous system to restore its neural functionality.Traditional treatments can only alleviate secondary injuries but cannot fundamentally repair the spinal cord.Consequently,there is a critical need to develop new treatments to promote functional repair after spinal cord injury.Over recent years,there have been seve ral developments in the use of stem cell therapy for the treatment of spinal cord injury.Alongside significant developments in the field of tissue engineering,three-dimensional bioprinting technology has become a hot research topic due to its ability to accurately print complex structures.This led to the loading of three-dimensional bioprinting scaffolds which provided precise cell localization.These three-dimensional bioprinting scaffolds co uld repair damaged neural circuits and had the potential to repair the damaged spinal cord.In this review,we discuss the mechanisms underlying simple stem cell therapy,the application of different types of stem cells for the treatment of spinal cord injury,and the different manufa cturing methods for three-dimensional bioprinting scaffolds.In particular,we focus on the development of three-dimensional bioprinting scaffolds for the treatment of spinal cord injury.
文摘BACKGROUND Diabetic cardiomyopathy is considered as a chronic complication of diabetes mellitus(DM).Therefore,early detection of left ventricular systolic function(LVSF)damage in DM is essential.AIM To explore the use of the three-dimensional speckle tracking technique(3D-STI)for measuring LVSF in DM patients via meta-analysis.METHODS The electronic databases were retrieved from the initial accessible time to 29 April 2023.The current study involved 9 studies,including 970 subjects.We carried out this meta-analysis to estimate myocardial function in DM compared with controls according to myocardial strain attained by 3D-STI.RESULTS Night articles including 970 subjects were included.No significant difference was detected in the left ventricular ejection fraction between the control and the diabetic group(P>0.05),while differences in global longitudinal strain,global circumferential strain,global radial strain,and global area strain were markedly different between the controls and DM patients(all P<0.05).CONCLUSION The 3D-STI could be applied to accurately measure early LVSF damage in patients with DM.
文摘Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金supported by the National Key R&D Program of China (Award No.2022YFC3401100)the National Natural Science Foundation of China。
文摘In recent years,notable progress has been achieved in both the hardware and algorithms of structured illumination microscopy(SIM).Nevertheless,the advancement of three-dimensional structured illumination microscopy(3DSIM)has been impeded by challenges arising from the speed and intricacy of polarization modulation.We introduce a high-speed modulation 3DSIM system,leveraging the polarizationmaintaining and modulation capabilities of a digital micromirror device(DMD)in conjunction with an electrooptic modulator.The DMD-3DSIM system yields a twofold enhancement in both lateral(133 nm)and axial(300 nm)resolution compared to wide-field imaging and can acquire a data set comprising 29 sections of 1024 pixels×1024 pixels,with 15 ms exposure time and 6.75 s per volume.The versatility of the DMD-3DSIM approach was exemplified through the imaging of various specimens,including fluorescent beads,nuclear pores,microtubules,actin filaments,and mitochondria within cells,as well as plant and animal tissues.Notably,polarized 3DSIM elucidated the orientation of actin filaments.Furthermore,the implementation of diverse deconvolution algorithms further enhances 3D resolution.The DMD-based 3DSIM system presents a rapid and reliable methodology for investigating biomedical phenomena,boasting capabilities encompassing 3D superresolution,fast temporal resolution,and polarization imaging.
基金funded by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skłodowska-Curie Action(MSCA)grant agreement No.101109961.
文摘Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
基金Supported by the National Natural Science Foundations of China under Grant Nos. 10904066 and 11004096the State Key Program for Basic Research of China under Grant No. 2011CBA00205
文摘We propose two schemes for realizing quantum secure direct communication (QSDC)by using a set ofordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs)as quantuminformation channels.In the first scheme,the photons from Bob to Alice are transmitted only once.After insuring thesecurity of the quantum channels,Bob encodes the secret message on his photons.Then Alice performs single-photontwo-DOF Bell bases measurements on her photons.This scheme has better security than former QSDC protocols.In thesecond scheme,Bob transmits photons to Alice twice.After insuring the security of the quantum channels,Bob encodesthe secret message on his photons.Then Alice performs two-photon Bell bases measurements on each DOF.The schemehas more information capacity than former QSDC protocols.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
基金supported by the National Magnetic Confinement Fusion Energy R&D Program of China(Nos.2018YFE0309100 and 2019YFE03010004)National Natural Science Foundation of China(No.51821005)。
文摘A toroidal soft x-ray imaging(T-SXRI)system has been developed to investigate threedimensional(3D)plasma physics on J-TEXT.This T-SXRI system consists of three sets of SXR arrays.Two sets are newly developed and located on the vacuum chamber wall at toroidal positionsφof 126.4°and 272.6°,respectively,while one set was established previously atφ=65.50.Each set of SXR arrays consists of three arrays viewing the plasma poloidally,and hence can be used separately to obtain SXR images via the tomographic method.The sawtooth precursor oscillations are measured by T-SXRI,and the corresponding images of perturbative SXR signals are successfully reconstructed at these three toroidal positions,hence providing measurement of the 3D structure of precursor oscillations.The observed 3D structure is consistent with the helical structure of the m/n=1/1 mode.The experimental observation confirms that the T-SXRI system is able to observe 3D structures in the J-TEXT plasma.
文摘Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste.
文摘BACKGROUND Acetabular component positioning in total hip arthroplasty(THA)is of key importance to ensure satisfactory post-operative outcomes and to minimize the risk of complications.The majority of acetabular components are aligned freehand,without the use of navigation methods.Patient specific instruments(PSI)and three-dimensional(3D)printing of THA placement guides are increasingly used in primary THA to ensure optimal positioning.AIM To summarize the literature on 3D printing in THA and how they improve acetabular component alignment.METHODS PubMed was used to identify and access scientific studies reporting on different 3D printing methods used in THA.Eight studies with 236 hips in 228 patients were included.The studies could be divided into two main categories;3D printed models and 3D printed guides.RESULTS 3D printing in THA helped improve preoperative cup size planning and post-operative Harris hip scores between intervention and control groups(P=0.019,P=0.009).Otherwise,outcome measures were heterogeneous and thus difficult to compare.The overarching consensus between the studies is that the use of 3D guidance tools can assist in improving THA cup positioning and reduce the need for revision THA and the associated costs.CONCLUSION The implementation of 3D printing and PSI for primary THA can significantly improve the positioning accuracy of the acetabular cup component and reduce the number of complications caused by malpositioning.