Understanding gene expression variations between species is pivotal for deciphering the evolutionary diversity in phenotypes. Rhesus macaques(Macaca mulatta, MMU)and crab-eating macaques(M. fascicularis, MFA) serve as...Understanding gene expression variations between species is pivotal for deciphering the evolutionary diversity in phenotypes. Rhesus macaques(Macaca mulatta, MMU)and crab-eating macaques(M. fascicularis, MFA) serve as crucial nonhuman primate biomedical models with different phenotypes. To date, however, large-scale comparative transcriptome research between these two species has not yet been fully explored. Here, we conducted systematic comparisons utilizing newly sequenced RNA-seq data from84 samples(41 MFA samples and 43 MMU samples)encompassing 14 common tissues. Our findings revealed a small fraction of genes(3.7%) with differential expression between the two species, as well as 36.5% of genes with tissue-specific expression in both macaques. Comparison of gene expression between macaques and humans indicated that 22.6% of orthologous genes displayed differential expression in at least two tissues. Moreover,19.41% of genes that overlapped with macaque-specific structural variants showed differential expression between humans and macaques. Of these, the FAM220A gene exhibited elevated expression in humans compared to macaques due to lineage-specific duplication. In summary,this study presents a large-scale transcriptomic comparison between MMU and MFA and between macaques and humans. The discovery of gene expression variations not only enhances the biomedical utility of macaque models but also contributes to the wider field of primate genomics.展开更多
Rice and wheat provide nearly 40%of human calorie and protein requirements.They share a common ancestor and belong to the Poaceae(grass)family.Characterizing their genetic homology is crucial for developing new cultiv...Rice and wheat provide nearly 40%of human calorie and protein requirements.They share a common ancestor and belong to the Poaceae(grass)family.Characterizing their genetic homology is crucial for developing new cultivars with enhanced traits.Several wheat genes and gene families have been characterized based on their rice orthologs.Rice–wheat orthology can identify genetic regions that regulate similar traits in both crops.Rice–wheat comparative genomics can identify candidate wheat genes in a genomic region identified by association or QTL mapping,deduce their putative functions and biochemical pathways,and develop molecular markers for marker-assisted breeding.A knowledge of gene homology facilitates the transfer between crops of genes or genomic regions associated with desirable traits by genetic engineering,gene editing,or wide crossing.展开更多
The high intraspecies heterogeneity of Baciillus coagulans leads to significant phenotypic differences among different strains.Thus,6 B.coagulans strains were tested in the present study using an irritable bowel syndr...The high intraspecies heterogeneity of Baciillus coagulans leads to significant phenotypic differences among different strains.Thus,6 B.coagulans strains were tested in the present study using an irritable bowel syndrome(IBS)animal model to determine whether the IBS-alleviating effects of B.coagulans strains are strain-specific.The results of this study showed that the ingestion of B.coagulans GBI-30,6086,and B.coagulans CCFM1041 significantly alleviated IBS symptoms in mice.In contrast,other B.coagulans strains showed no or limited alleviating effects on IBS symptoms.According to our experimental results,the two main common features of these strains were as follows:1)The resistance of vegetative cells to bile salts,and 2)ability to synthesize specific lipids and secondary metabolites.Screening strains based on these two indicators may greatly reduce costs and provide a basis for mining new functional B.coagulans strains.Our results also suggest that administration of B.coagulans could significantly regulate microbiota dysbiosis in animal models.Moreover,the close relationships between the gut microbiota,gut microbiota metabolites,and IBS were further confirmed in this study.展开更多
Deterministic compartment models(CMs)and stochastic models,including stochastic CMs and agent-based models,are widely utilized in epidemic modeling.However,the relationship between CMs and their corresponding stochast...Deterministic compartment models(CMs)and stochastic models,including stochastic CMs and agent-based models,are widely utilized in epidemic modeling.However,the relationship between CMs and their corresponding stochastic models is not well understood.The present study aimed to address this gap by conducting a comparative study using the susceptible,exposed,infectious,and recovered(SEIR)model and its extended CMs from the coronavirus disease 2019 modeling literature.We demonstrated the equivalence of the numerical solution of CMs using the Euler scheme and their stochastic counterparts through theoretical analysis and simulations.Based on this equivalence,we proposed an efficient model calibration method that could replicate the exact solution of CMs in the corresponding stochastic models through parameter adjustment.The advancement in calibration techniques enhanced the accuracy of stochastic modeling in capturing the dynamics of epidemics.However,it should be noted that discrete-time stochastic models cannot perfectly reproduce the exact solution of continuous-time CMs.Additionally,we proposed a new stochastic compartment and agent mixed model as an alternative to agent-based models for large-scale population simulations with a limited number of agents.This model offered a balance between computational efficiency and accuracy.The results of this research contributed to the comparison and unification of deterministic CMs and stochastic models in epidemic modeling.Furthermore,the results had implications for the development of hybrid models that integrated the strengths of both frameworks.Overall,the present study has provided valuable epidemic modeling techniques and their practical applications for understanding and controlling the spread of infectious diseases.展开更多
Rosaceae represents a vast and complex group of species,with its classification being intricate and contentious.The taxonomic placement of many species within this family has been a subject of ongoing debate.The study ...Rosaceae represents a vast and complex group of species,with its classification being intricate and contentious.The taxonomic placement of many species within this family has been a subject of ongoing debate.The study utilized the Illumina platform to sequence 19 plant species from 10 genera in the Rosaceae.The cp genomes,vary-ing in size from 153,366 to 159,895 bp,followed the typical quadripartite organization consisting of a large single-copy(LSC)region(84,545 to 87,883 bp),a small single-copy(SSC)region(18,174 to 19,259 bp),and a pair of inverted repeat(IR)regions(25,310 to 26,396 bp).These genomes contained 132–138 annotated genes,including 87 to 93 protein-coding genes(PCGs),37 tRNA genes,and 8 rRNA genes using MISA software,52 to 121 simple sequence repeat(SSR)loci were identified.D.arbuscular contained the least of SSRs and did not have hexanotides,A.lineata contained the richest SSRs.Long terminal repeats(LTRs)were primarily composed of palindromic and forward repeat sequences,meanwhile,The richest LTRs were found in Argentina lineata.Except for Argentina lineata,Fragariastrum eriocarpum,and Prunus trichostoma,which varied in gene type and position on both sides of the boundary,the remaining species were found to be mostly conserved according to IR boundary analysis.The examination of the Ka/Ks ratio revealed that only the infA gene had a value greater than 1,indicating that this gene was primarily subjected to positive selection during evolution.Additionally,9 hotspots of variation were identified in the LSC and SSC regions.Phylogenetic analysis confirmed the scientific validity of the genus Prunus L.sensu lato(s.l.)within the Rosaceae family.The separation of the three genera Argentina Hill,Fragariastrum Heist.ex Fabr.and Dasiphora Raf.from Potentilla L.may be a more scientific classification.These results offer fresh perspectives on the taxonomy of the Rosaceae.展开更多
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to del...This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to delve into and refine the application of the Dijkstra’s algorithm in this context,a method conventionally esteemed for its efficiency in static networks.Thus,this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm,considering adaptation to the dynamic network conditions that are typical for MANETs.This paper has shown through detailed algorithmic analysis that Dijkstra’s algorithm,when adapted for dynamic updates,yields a very workable solution to the problem of real-time routing in MANETs.The results indicate that with these changes,Dijkstra’s algorithm performs much better computationally and 30%better in routing optimization than Bellman-Ford when working with configurations of sparse networks.The theoretical framework adapted,with the adaptation of the Dijkstra’s algorithm for dynamically changing network topologies,is novel in this work and quite different from any traditional application.The adaptation should offer more efficient routing and less computational overhead,most apt in the limited resource environment of MANETs.Thus,from these findings,one may derive a conclusion that the proposed version of Dijkstra’s algorithm is the best and most feasible choice of the routing protocol for MANETs given all pertinent key performance and resource consumption indicators and further that the proposed method offers a marked improvement over traditional methods.This paper,therefore,operationalizes the theoretical model into practical scenarios and also further research with empirical simulations to understand more about its operational effectiveness.展开更多
Steel-concrete composite structures(SCCS)have been widely used as primary load-bearing components in large-scale civil infrastructures.As the basis of the co-working ability of steel plate and concrete,the bonding sta...Steel-concrete composite structures(SCCS)have been widely used as primary load-bearing components in large-scale civil infrastructures.As the basis of the co-working ability of steel plate and concrete,the bonding status plays an essential role in guaranteeing the structural performance of SCCS.Accordingly,efficient non-destructive testing(NDT)on interfacial debondings in SCCS has become a prominent research area.Multi-channel analysis of surface waves(MASW)has been validated as an effective NDT technique for interfacial debonding detection for SCCS.However,the feasibility of MASW must be validated using experimental measurements.This study establishes a high-frequency data synchronous acquisition system with 32 channels to perform comparative verification experiments in depth.First,the current sensing approaches for high-frequency vibration and stress waves are summarized.Secondly,three types of contact sensors,namely,piezoelectric lead-zirconate-titanate(PZT)patches,accelerometers,and ultrasonic transducers,are selected for MASW measurement.Then,the selection and optimization of the force hammer head are performed.Comparative experiments are carried out for the optimal selection of ultrasonic transducers,PZT patches,and accelerometers for MASW measurement.In addition,the influence of different pasting methods on the output signal of the sensor array is discussed.Experimental results indicate that optimized PZT patches,acceleration sensors,and ultrasonic transducers can provide efficient data acquisition for MASW-based non-destructive experiments.The research findings in this study lay a solid foundation for analyzing the recognition accuracy of contact MASW measurement using different sensor arrays.展开更多
In its new development stage,China seeks to derive new dynamism from reform and opening up at a higher level to boost consumption and services.This process coincides with a further differentiation of comparative advan...In its new development stage,China seeks to derive new dynamism from reform and opening up at a higher level to boost consumption and services.This process coincides with a further differentiation of comparative advantages across regions.Economic activity and population will continue to concentrate in clusters in coastal and central cities amid a continuous outflow of population from remote areas.Development expansion from coastal to interior regions and from central cities to the periphery will promote a new regional development paradigm of“dual centers and periphery”.Therefore,China’s regional development strategy should follow the new theory of seeking relative equilibrium amid development,identify regions of population inflow and outflow,and explore a new development path of regional specialization and coordination.By deepening market reforms and increasing central government coordination,the country is poised to improve the spatial allocation of resources and unleash institutional dividends in the process of developing a unified national market.展开更多
Researchers around the world strive to communicate new knowledge,primarily via publication,with the abstract being crucial in conveying core insights.Previous research has generally analyzed the discourse features of ...Researchers around the world strive to communicate new knowledge,primarily via publication,with the abstract being crucial in conveying core insights.Previous research has generally analyzed the discourse features of abstracts from a macro perspective and often employed either outdated texts,such as those over a decade old,or papers written by authors with lower English academic writing proficiency as research material.In this study,we analyzed forty abstracts from leading journals in applied linguistics,evenly split between Chinese and international journals.It revealed that the use of nominalization in abstracts by Chinese and international scholars showed similarities due to the universal academic requirement for conciseness.However,due to cultural and educational differences,each group differed in their respective language choices and nominalization usage.By analyzing the application of nominalization in different cultural contexts,the results of our study offered practical suggestions for crafting abstracts that effectively convey information,thereby,contributing to the broader academic community.展开更多
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar...Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats.展开更多
Desmodus rotundus and Diphylla ecaudata, both of which are mammals of the order Chiroptera, Desmodontidae family, their diet consisting exclusively of blood. D. rotundus is the main vector and transmitter of the rabie...Desmodus rotundus and Diphylla ecaudata, both of which are mammals of the order Chiroptera, Desmodontidae family, their diet consisting exclusively of blood. D. rotundus is the main vector and transmitter of the rabies virus, which affects human beings as well as several livestock species so the study of this bat species is of high importance within the fields of animal agriculture and public health. The present study describes and compares the histologic characteristics of the urinary system of two hematophagous bat species. A total of 5 bats from each species were captured in the municipalities of Progreso de Obregón, Hidalgo (D. rotundus), and Huayacocotla, Veracruz (D. ecaudata). Organs belonging to the urinary system were extracted: kidneys, ureters, urinary bladder, and urethra;samples were fixed using 10% formalin and processed by the paraffin embedding technique, obtaining sections of 5 µm thickness, which in turn were stained using hematoxylin-eosin (H-E) and Gomori trichrome (GT) stains. From the obtained histologic preparations, a descriptive and comparative analysis of the structural organography of the urinary system of both species was made, and no noteworthy histological differences between samples were noted. The present research is intended to provide a framework for future studies of these species’ currently understudied microscopic anatomy.展开更多
This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income leve...This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income level,and income distribution.Using the prevalence of undernourishment as an indicator of food security,the paper empirically tests the degree of impact of various factors on food security in both countries using Tobit regression and Newey regression methods.The study finds that improving the level of economic development can significantly enhance food security in both countriesꎻreducing the Gini coefficient has a significant impact on India,but not on Chinaꎻincreasing the agricultural production per capita has a much greater effect on China than on India.Therefore,both countries should take measures that are both similar and different according to their national conditions to improve their food security level.展开更多
This research undertakes a nuanced examination of the intersections and distinctions between these two diverse musical traditions.Employing a meticulous comparative analysis,the study scrutinizes fundamental musical e...This research undertakes a nuanced examination of the intersections and distinctions between these two diverse musical traditions.Employing a meticulous comparative analysis,the study scrutinizes fundamental musical elements such as scales,modes,and compositional styles,illuminating shared threads and distinctive attributes that characterize Chinese and Western music.Against the backdrop of contemporary global dynamics,the research investigates the ongoing integration of these musical cultures.It explores the impact of globalization and technological advancements,revealing instances of cross-cultural collaboration and the emergence of hybrid musical forms.Augmenting theoretical discussions with concrete case studies,the paper offers illuminating examples of how Chinese and Western musical elements interweave,contributing to the evolving landscape of global music.This research not only advances scholarly understanding but also contributes practical insights for musicians,educators,and enthusiasts navigating the evolving dynamics of cross-cultural musical expression.By elucidating the intricate relationship between Chinese and Western music cultures,the paper underscores the richness borne out of their interaction and the cultural synthesis that defines contemporary musical landscapes.展开更多
“Jing Ye Si”is a classical poem with international influence by the Chinese poet Li Bai in the Tang Dynasty,which expresses the poet’s deep nostalgia.This paper compares and analyzes its two English versions transl...“Jing Ye Si”is a classical poem with international influence by the Chinese poet Li Bai in the Tang Dynasty,which expresses the poet’s deep nostalgia.This paper compares and analyzes its two English versions translated by the Chinese translator Xu Yuanchong and the British translator W.J.B.Fletcher based on the“three beauties”principle(beauty in sense,beauty in sound,and beauty in form),and discovers that the English version of Xu basically achieves the unity of the“three beauties”,while the English version of Fletcher realizes the“beauty in sound and form”,but deviates from the“beauty in sense”mainly owing to the inaccurate comprehension of the moon as an image and other factors.This analysis may afford us with certain reference in poetry translation.展开更多
This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and i...This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and its powerful data management and analysis tools make it suitable for handling complex data analysis tasks.It is also highly customizable,allowing users to create custom functions and packages to meet their specific needs.Additionally,R language provides high reproducibility,making it easy to replicate and verify research results,and it has excellent collaboration capabilities,enabling multiple users to work on the same project simultaneously.These advantages make R language a more suitable choice for complex data analysis tasks,particularly in scientific research and business applications.The findings of this study will help people understand that R is not just a language that can handle more data than Excel and demonstrate that r is essential to the field of data analysis.At the same time,it will also help users and organizations make informed decisions regarding their data analysis needs and software preferences.展开更多
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod...In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A companys operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article.展开更多
基金supported by the National Natural Science Foundation of China (82021001 and 31825018 to Q.S., 32370658 to Y.M.,82001372 to X.Y.)National Key Research and Development Program of China (2022YFF0710901)+2 种基金National Science and Technology Innovation2030 Major Program (2021ZD0200900) to Q.S.Shanghai Pujiang Program (22PJ1407300)Shanghai Jiao Tong University 2030 Initiative (WH510363001-7) to Y.M。
文摘Understanding gene expression variations between species is pivotal for deciphering the evolutionary diversity in phenotypes. Rhesus macaques(Macaca mulatta, MMU)and crab-eating macaques(M. fascicularis, MFA) serve as crucial nonhuman primate biomedical models with different phenotypes. To date, however, large-scale comparative transcriptome research between these two species has not yet been fully explored. Here, we conducted systematic comparisons utilizing newly sequenced RNA-seq data from84 samples(41 MFA samples and 43 MMU samples)encompassing 14 common tissues. Our findings revealed a small fraction of genes(3.7%) with differential expression between the two species, as well as 36.5% of genes with tissue-specific expression in both macaques. Comparison of gene expression between macaques and humans indicated that 22.6% of orthologous genes displayed differential expression in at least two tissues. Moreover,19.41% of genes that overlapped with macaque-specific structural variants showed differential expression between humans and macaques. Of these, the FAM220A gene exhibited elevated expression in humans compared to macaques due to lineage-specific duplication. In summary,this study presents a large-scale transcriptomic comparison between MMU and MFA and between macaques and humans. The discovery of gene expression variations not only enhances the biomedical utility of macaque models but also contributes to the wider field of primate genomics.
文摘Rice and wheat provide nearly 40%of human calorie and protein requirements.They share a common ancestor and belong to the Poaceae(grass)family.Characterizing their genetic homology is crucial for developing new cultivars with enhanced traits.Several wheat genes and gene families have been characterized based on their rice orthologs.Rice–wheat orthology can identify genetic regions that regulate similar traits in both crops.Rice–wheat comparative genomics can identify candidate wheat genes in a genomic region identified by association or QTL mapping,deduce their putative functions and biochemical pathways,and develop molecular markers for marker-assisted breeding.A knowledge of gene homology facilitates the transfer between crops of genes or genomic regions associated with desirable traits by genetic engineering,gene editing,or wide crossing.
基金supported by the Natural Science Foundation of Jiangsu Province(BK20200084)the National Natural Science Foundation of China(31871773 and 31820103010)+1 种基金the Collaborative Innovation Center of Food Safety and Quality Control in Jiangsu Province and Key Talents Project of“Strengthening Health through Science and Education”of Wuxi Health and Family Planning Commission(ZDRC039)Top Talents Project of“Six-one Project”for High-level Health Talents in Jiangsu Province(LGY2018016)。
文摘The high intraspecies heterogeneity of Baciillus coagulans leads to significant phenotypic differences among different strains.Thus,6 B.coagulans strains were tested in the present study using an irritable bowel syndrome(IBS)animal model to determine whether the IBS-alleviating effects of B.coagulans strains are strain-specific.The results of this study showed that the ingestion of B.coagulans GBI-30,6086,and B.coagulans CCFM1041 significantly alleviated IBS symptoms in mice.In contrast,other B.coagulans strains showed no or limited alleviating effects on IBS symptoms.According to our experimental results,the two main common features of these strains were as follows:1)The resistance of vegetative cells to bile salts,and 2)ability to synthesize specific lipids and secondary metabolites.Screening strains based on these two indicators may greatly reduce costs and provide a basis for mining new functional B.coagulans strains.Our results also suggest that administration of B.coagulans could significantly regulate microbiota dysbiosis in animal models.Moreover,the close relationships between the gut microbiota,gut microbiota metabolites,and IBS were further confirmed in this study.
基金supported by the National Natural Science Foundation of China(Grant Nos.82173620 to Yang Zhao and 82041024 to Feng Chen)partially supported by the Bill&Melinda Gates Foundation(Grant No.INV-006371 to Feng Chen)Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘Deterministic compartment models(CMs)and stochastic models,including stochastic CMs and agent-based models,are widely utilized in epidemic modeling.However,the relationship between CMs and their corresponding stochastic models is not well understood.The present study aimed to address this gap by conducting a comparative study using the susceptible,exposed,infectious,and recovered(SEIR)model and its extended CMs from the coronavirus disease 2019 modeling literature.We demonstrated the equivalence of the numerical solution of CMs using the Euler scheme and their stochastic counterparts through theoretical analysis and simulations.Based on this equivalence,we proposed an efficient model calibration method that could replicate the exact solution of CMs in the corresponding stochastic models through parameter adjustment.The advancement in calibration techniques enhanced the accuracy of stochastic modeling in capturing the dynamics of epidemics.However,it should be noted that discrete-time stochastic models cannot perfectly reproduce the exact solution of continuous-time CMs.Additionally,we proposed a new stochastic compartment and agent mixed model as an alternative to agent-based models for large-scale population simulations with a limited number of agents.This model offered a balance between computational efficiency and accuracy.The results of this research contributed to the comparison and unification of deterministic CMs and stochastic models in epidemic modeling.Furthermore,the results had implications for the development of hybrid models that integrated the strengths of both frameworks.Overall,the present study has provided valuable epidemic modeling techniques and their practical applications for understanding and controlling the spread of infectious diseases.
基金funded by the Jiangxi Provincial Natural Science Foundation,Grant Number 20232BAB216119.
文摘Rosaceae represents a vast and complex group of species,with its classification being intricate and contentious.The taxonomic placement of many species within this family has been a subject of ongoing debate.The study utilized the Illumina platform to sequence 19 plant species from 10 genera in the Rosaceae.The cp genomes,vary-ing in size from 153,366 to 159,895 bp,followed the typical quadripartite organization consisting of a large single-copy(LSC)region(84,545 to 87,883 bp),a small single-copy(SSC)region(18,174 to 19,259 bp),and a pair of inverted repeat(IR)regions(25,310 to 26,396 bp).These genomes contained 132–138 annotated genes,including 87 to 93 protein-coding genes(PCGs),37 tRNA genes,and 8 rRNA genes using MISA software,52 to 121 simple sequence repeat(SSR)loci were identified.D.arbuscular contained the least of SSRs and did not have hexanotides,A.lineata contained the richest SSRs.Long terminal repeats(LTRs)were primarily composed of palindromic and forward repeat sequences,meanwhile,The richest LTRs were found in Argentina lineata.Except for Argentina lineata,Fragariastrum eriocarpum,and Prunus trichostoma,which varied in gene type and position on both sides of the boundary,the remaining species were found to be mostly conserved according to IR boundary analysis.The examination of the Ka/Ks ratio revealed that only the infA gene had a value greater than 1,indicating that this gene was primarily subjected to positive selection during evolution.Additionally,9 hotspots of variation were identified in the LSC and SSC regions.Phylogenetic analysis confirmed the scientific validity of the genus Prunus L.sensu lato(s.l.)within the Rosaceae family.The separation of the three genera Argentina Hill,Fragariastrum Heist.ex Fabr.and Dasiphora Raf.from Potentilla L.may be a more scientific classification.These results offer fresh perspectives on the taxonomy of the Rosaceae.
基金supported by Northern Border University,Arar,Kingdom of Saudi Arabia,through the Project Number“NBU-FFR-2024-2248-03”.
文摘This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of nodes.Themain objective was to delve into and refine the application of the Dijkstra’s algorithm in this context,a method conventionally esteemed for its efficiency in static networks.Thus,this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm,considering adaptation to the dynamic network conditions that are typical for MANETs.This paper has shown through detailed algorithmic analysis that Dijkstra’s algorithm,when adapted for dynamic updates,yields a very workable solution to the problem of real-time routing in MANETs.The results indicate that with these changes,Dijkstra’s algorithm performs much better computationally and 30%better in routing optimization than Bellman-Ford when working with configurations of sparse networks.The theoretical framework adapted,with the adaptation of the Dijkstra’s algorithm for dynamically changing network topologies,is novel in this work and quite different from any traditional application.The adaptation should offer more efficient routing and less computational overhead,most apt in the limited resource environment of MANETs.Thus,from these findings,one may derive a conclusion that the proposed version of Dijkstra’s algorithm is the best and most feasible choice of the routing protocol for MANETs given all pertinent key performance and resource consumption indicators and further that the proposed method offers a marked improvement over traditional methods.This paper,therefore,operationalizes the theoretical model into practical scenarios and also further research with empirical simulations to understand more about its operational effectiveness.
基金National Natural Science Foundation of China under Grant (Nos.52192662,52020105005,51908320)the Beijing Nova Program under Grant No.20220484012+1 种基金the Interdisciplinary Research Project for Young Teachers of USTB (Fundamental Research Funds for the Central Universities,FRF-IDRY-22-013)the Key Laboratory for Intelligent Infrastructure and Monitoring of Fujian Province (Huaqiao University,IIM-01-05)。
文摘Steel-concrete composite structures(SCCS)have been widely used as primary load-bearing components in large-scale civil infrastructures.As the basis of the co-working ability of steel plate and concrete,the bonding status plays an essential role in guaranteeing the structural performance of SCCS.Accordingly,efficient non-destructive testing(NDT)on interfacial debondings in SCCS has become a prominent research area.Multi-channel analysis of surface waves(MASW)has been validated as an effective NDT technique for interfacial debonding detection for SCCS.However,the feasibility of MASW must be validated using experimental measurements.This study establishes a high-frequency data synchronous acquisition system with 32 channels to perform comparative verification experiments in depth.First,the current sensing approaches for high-frequency vibration and stress waves are summarized.Secondly,three types of contact sensors,namely,piezoelectric lead-zirconate-titanate(PZT)patches,accelerometers,and ultrasonic transducers,are selected for MASW measurement.Then,the selection and optimization of the force hammer head are performed.Comparative experiments are carried out for the optimal selection of ultrasonic transducers,PZT patches,and accelerometers for MASW measurement.In addition,the influence of different pasting methods on the output signal of the sensor array is discussed.Experimental results indicate that optimized PZT patches,acceleration sensors,and ultrasonic transducers can provide efficient data acquisition for MASW-based non-destructive experiments.The research findings in this study lay a solid foundation for analyzing the recognition accuracy of contact MASW measurement using different sensor arrays.
基金This paper is a result of the Major Project for the Research and Development of Marxist Theory and Major Project of the National Social Science Foundation of China(NSSFC)“Study on the In-Depth Implementation of the Coordinated Regional Development Strategy”(Grant No.2001MZD011)General Project of the National Natural Science Foundation of China(NSFC)“Spatial Structure and Effective Governance of Cities under the Big Data Horizon”(Grant No.72073094)and Key Project of the NSFC“Study on the Transformative Development and Governance of Small Towns in China”(Grant No.71834005).
文摘In its new development stage,China seeks to derive new dynamism from reform and opening up at a higher level to boost consumption and services.This process coincides with a further differentiation of comparative advantages across regions.Economic activity and population will continue to concentrate in clusters in coastal and central cities amid a continuous outflow of population from remote areas.Development expansion from coastal to interior regions and from central cities to the periphery will promote a new regional development paradigm of“dual centers and periphery”.Therefore,China’s regional development strategy should follow the new theory of seeking relative equilibrium amid development,identify regions of population inflow and outflow,and explore a new development path of regional specialization and coordination.By deepening market reforms and increasing central government coordination,the country is poised to improve the spatial allocation of resources and unleash institutional dividends in the process of developing a unified national market.
文摘Researchers around the world strive to communicate new knowledge,primarily via publication,with the abstract being crucial in conveying core insights.Previous research has generally analyzed the discourse features of abstracts from a macro perspective and often employed either outdated texts,such as those over a decade old,or papers written by authors with lower English academic writing proficiency as research material.In this study,we analyzed forty abstracts from leading journals in applied linguistics,evenly split between Chinese and international journals.It revealed that the use of nominalization in abstracts by Chinese and international scholars showed similarities due to the universal academic requirement for conciseness.However,due to cultural and educational differences,each group differed in their respective language choices and nominalization usage.By analyzing the application of nominalization in different cultural contexts,the results of our study offered practical suggestions for crafting abstracts that effectively convey information,thereby,contributing to the broader academic community.
基金This researchwork is supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R411),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats.
文摘Desmodus rotundus and Diphylla ecaudata, both of which are mammals of the order Chiroptera, Desmodontidae family, their diet consisting exclusively of blood. D. rotundus is the main vector and transmitter of the rabies virus, which affects human beings as well as several livestock species so the study of this bat species is of high importance within the fields of animal agriculture and public health. The present study describes and compares the histologic characteristics of the urinary system of two hematophagous bat species. A total of 5 bats from each species were captured in the municipalities of Progreso de Obregón, Hidalgo (D. rotundus), and Huayacocotla, Veracruz (D. ecaudata). Organs belonging to the urinary system were extracted: kidneys, ureters, urinary bladder, and urethra;samples were fixed using 10% formalin and processed by the paraffin embedding technique, obtaining sections of 5 µm thickness, which in turn were stained using hematoxylin-eosin (H-E) and Gomori trichrome (GT) stains. From the obtained histologic preparations, a descriptive and comparative analysis of the structural organography of the urinary system of both species was made, and no noteworthy histological differences between samples were noted. The present research is intended to provide a framework for future studies of these species’ currently understudied microscopic anatomy.
基金Supported by the MOE(Ministry of Education in China)Project of Humanities and Social Sciences(19YJA790105).
文摘This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income level,and income distribution.Using the prevalence of undernourishment as an indicator of food security,the paper empirically tests the degree of impact of various factors on food security in both countries using Tobit regression and Newey regression methods.The study finds that improving the level of economic development can significantly enhance food security in both countriesꎻreducing the Gini coefficient has a significant impact on India,but not on Chinaꎻincreasing the agricultural production per capita has a much greater effect on China than on India.Therefore,both countries should take measures that are both similar and different according to their national conditions to improve their food security level.
文摘This research undertakes a nuanced examination of the intersections and distinctions between these two diverse musical traditions.Employing a meticulous comparative analysis,the study scrutinizes fundamental musical elements such as scales,modes,and compositional styles,illuminating shared threads and distinctive attributes that characterize Chinese and Western music.Against the backdrop of contemporary global dynamics,the research investigates the ongoing integration of these musical cultures.It explores the impact of globalization and technological advancements,revealing instances of cross-cultural collaboration and the emergence of hybrid musical forms.Augmenting theoretical discussions with concrete case studies,the paper offers illuminating examples of how Chinese and Western musical elements interweave,contributing to the evolving landscape of global music.This research not only advances scholarly understanding but also contributes practical insights for musicians,educators,and enthusiasts navigating the evolving dynamics of cross-cultural musical expression.By elucidating the intricate relationship between Chinese and Western music cultures,the paper underscores the richness borne out of their interaction and the cultural synthesis that defines contemporary musical landscapes.
文摘“Jing Ye Si”is a classical poem with international influence by the Chinese poet Li Bai in the Tang Dynasty,which expresses the poet’s deep nostalgia.This paper compares and analyzes its two English versions translated by the Chinese translator Xu Yuanchong and the British translator W.J.B.Fletcher based on the“three beauties”principle(beauty in sense,beauty in sound,and beauty in form),and discovers that the English version of Xu basically achieves the unity of the“three beauties”,while the English version of Fletcher realizes the“beauty in sound and form”,but deviates from the“beauty in sense”mainly owing to the inaccurate comprehension of the moon as an image and other factors.This analysis may afford us with certain reference in poetry translation.
文摘This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and its powerful data management and analysis tools make it suitable for handling complex data analysis tasks.It is also highly customizable,allowing users to create custom functions and packages to meet their specific needs.Additionally,R language provides high reproducibility,making it easy to replicate and verify research results,and it has excellent collaboration capabilities,enabling multiple users to work on the same project simultaneously.These advantages make R language a more suitable choice for complex data analysis tasks,particularly in scientific research and business applications.The findings of this study will help people understand that R is not just a language that can handle more data than Excel and demonstrate that r is essential to the field of data analysis.At the same time,it will also help users and organizations make informed decisions regarding their data analysis needs and software preferences.
文摘In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A companys operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article.