The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petrolife...The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petroliferous sedimentary basin in China because of its continual annual oil and gas equivalent production of tens of millions of tons(ca.220–440 million barrels per year)since 1959.The SLB was previously thought to have developed on Hercynian basement and accumulated continuous sedimentary deposits during the Late Jurassic and Cretaceous(Wan et al.,2013;Wang et al.,2016).展开更多
Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material co...Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material combining the solvent evaporation method and spray drying method.The protection by the outer capsule wall was used to prolong the service life of the corrosion inhibitor.The dispersion,encapsulation,thermal stability of microcapsules,and the degradation rate of capsule wall in concrete pore solution were analyzed by ultra-deep field microscopy,scanning electron microscopy,thermal analyzer,and sodium ion release rate analysis.The microcapsules were incorporated into mortar samples containing steel reinforcement,and the effects of double-layered microcapsule corrosion inhibitors on the performance of the cement matrix and the actual corrosion-inhibiting effect were analyzed.The experimental results show that the double-layered microcapsules have a moderate particle size and uniform distribution,and the capsules were completely wrapped.The microcapsules as a whole have good thermal stability below 230 ℃.The monolayer membrane structure microcapsules completely broke within 1 day in the simulated concrete pore solution,and the double-layer membrane structure prolonged the service life of the microcapsules to 80 days in the simulated concrete pore solution before the core material was completely released.The mortar samples containing steel reinforcement incorporated with the double-layered microcapsule corrosion inhibitors still maintained a higher corrosion potential than the monolayer microcapsule corrosion inhibitors control group at 60 days.The incorporation of double-layered microcapsules into the cement matrix has no significant adverse effect on the setting time and early strength.展开更多
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.展开更多
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extr...Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extract accurate governing equations under noisy conditions without prior knowledge.Specifically,the proposed method combines gene expression programming,one type of evolutionary algorithm capable of generating unseen terms based solely on basic operators and functional terms,with symbolic regression neural networks.These networks are designed to represent explicit functional expressions and optimize them with data gradients.In particular,the specifically designed neural networks can be easily transformed to physical constraints for the training data,embedding the discovered PDEs to further optimize the metadata used for iterative PDE identification.The proposed method has been tested in four canonical PDE cases,validating its effectiveness without preliminary information and confirming its suitability for practical applications across various noise levels.展开更多
To solve the low efficiency of approximate queries caused by the large sizes of the knowledge graphs in the real world,an embedding-based approximate query method is proposed.First,the nodes in the query graph are cla...To solve the low efficiency of approximate queries caused by the large sizes of the knowledge graphs in the real world,an embedding-based approximate query method is proposed.First,the nodes in the query graph are classified according to the degrees of approximation required for different types of nodes.This classification transforms the query problem into three constraints,from which approximate information is extracted.Second,candidates are generated by calculating the similarity between embeddings.Finally,a deep neural network model is designed,incorporating a loss function based on the high-dimensional ellipsoidal diffusion distance.This model identifies the distance between nodes using their embeddings and constructs a score function.k nodes are returned as the query results.The results show that the proposed method can return both exact results and approximate matching results.On datasets DBLP(DataBase systems and Logic Programming)and FUA-S(Flight USA Airports-Sparse),this method exhibits superior performance in terms of precision and recall,returning results in 0.10 and 0.03 s,respectively.This indicates greater efficiency compared to PathSim and other comparative methods.展开更多
Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD patt...Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD pattern genes using the new strategy,TCM-HIN2Vec,which involves heterogeneous network embedding and transcriptomic experiments.First,a heterogeneous network of traditional Chinese medicine(TCM)patterns was constructed using public databases.Next,we predicted HQD pattern genes using a heterogeneous network-embedding algorithm.We then analyzed the functional characteristics of HQD pattern genes using gene enrichment analysis and examined gene expression levels using RNA-seq.Finally,we identified TCM herbs that demonstrated enriched interactions with HQD pattern genes via herbal enrichment analysis.Results: Our TCM-HIN2Vec strategy revealed that candidate genes associated with HQD pattern were significantly enriched in energy metabolism,signal transduction pathways,and immune processes.Moreover,we found that these candidate genes were significantly differentially expressed in the transcriptional profile of mice model with heart failure with a qi deficiency pattern.Furthermore,herbal enrichment analysis identified TCM herbs that demonstrated enriched interactions with the top 10 candidate genes and could potentially serve as drug candidates for treating HQD.Conclusion: Our results suggested that TCM-HIN2Vec is capable of not only accurately identifying HQD pattern genes,but also deciphering the basis of HQD pattern.Furthermore our finding indicated that TCM-HIN2Vec may be further expanded to develop other patterns,leading to a new approach aimed at elucidating general TCM patterns and developing precision medicine.展开更多
In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,t...In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods.展开更多
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi...Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.展开更多
This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while ...This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.展开更多
How to extract optimal composite attributes from a variety of conventional seismic attributes to detect reservoir features is a reservoir predication key,which is usually solved by reducing dimensionality.Principle co...How to extract optimal composite attributes from a variety of conventional seismic attributes to detect reservoir features is a reservoir predication key,which is usually solved by reducing dimensionality.Principle component analysis(PCA) is the most widely-used linear dimensionality reduction method at present.However,the relationships between seismic attributes and reservoir features are non-linear,so seismic attribute dimensionality reduction based on linear transforms can't solve non-linear problems well,reducing reservoir prediction precision.As a new non-linear learning method,manifold learning supplies a new method for seismic attribute analysis.It can discover the intrinsic features and rules hidden in the data by computing low-dimensional,neighborhood-preserving embeddings of high-dimensional inputs.In this paper,we try to extract seismic attributes using locally linear embedding(LLE),realizing inter-horizon attributes dimensionality reduction of 3D seismic data first and discuss the optimization of its key parameters.Combining model analysis and case studies,we compare the dimensionality reduction and clustering effects of LLE and PCA,both of which indicate that LLE can retain the intrinsic structure of the inputs.The composite attributes and clustering results based on LLE better characterize the distribution of sedimentary facies,reservoir,and even reservoir fluids.展开更多
Objective To compare the therapeutic effect of catgut embedding combined with diet plus exercise with that of diet plus exercise in treating simple obesity complicated with abnormal blood fat. Methods A prescription o...Objective To compare the therapeutic effect of catgut embedding combined with diet plus exercise with that of diet plus exercise in treating simple obesity complicated with abnormal blood fat. Methods A prescription of diet plus exercise was given to the patients in a control group, and catgut embedding was added to the prescription in a treatment group. It was given once every 15 days for the 1st three treatments, and once every month for the 2^nd three treatments. Six treatments constituted a therapeutic course. Body weight and blood fat were measured before and half a year since treatment. Results After treatment, BMI, TO, TG and LDL were very significantly improved in the treatment group (P〈0.01), and BMI and TG were very significantly (P〈0.01) and TO and LDL were significantly (P〈0.05) improved in the control group. HDL was not obviously improved in both groups (P〉0.05). The improvement of TO, TG and LDL in the treatment group was significantly more than that in the control group (P〈0.01), but no difference in improvement of BMI and HDL was found between the two groups (P〉0.05). Conclusion The therapy of diet plus exercise was effective in body weight reduction and lowering blood fat in patients with simple obesity complicated with abnormal blood fat, and catgut embedding used in combination was even better in lowering blood fat.展开更多
Let Qn,k (n 〉 3, 1 〈 k ≤ n - 1) be an n-dimensional enhanced hypercube which is an attractive variant of the hypercube and can be obtained by adding some complementary edges, fv and fe be the numbers of faulty ve...Let Qn,k (n 〉 3, 1 〈 k ≤ n - 1) be an n-dimensional enhanced hypercube which is an attractive variant of the hypercube and can be obtained by adding some complementary edges, fv and fe be the numbers of faulty vertices and faulty edges, respectively. In this paper, we give three main results. First, a fault-free path P[u, v] of length at least 2n - 2fv - 1 (respectively, 2n - 2fv - 2) can be embedded on Qn,k with fv + f≤ n- 1 when dQn,k (u, v) is odd (respectively, dQ,~,k (u, v) is even). Secondly, an Q,,k is (n - 2) edgefault-free hyper Hamiltonianaceable when n ( 3) and k have the same parity. Lastly, a fault-free cycle of length at least 2n - 2fv can be embedded on Qn,k with f~ 〈 n - 1 and fv+f≤2n-4.展开更多
Iron and titanium were recovered from beach titanomagnetite(TTM) concentrate by embedding direct reduction and magnetic separation. The reduction products and the effects of the reductant type and reduction temperatur...Iron and titanium were recovered from beach titanomagnetite(TTM) concentrate by embedding direct reduction and magnetic separation. The reduction products and the effects of the reductant type and reduction temperature on the reduction behavior were investigated. The results showed that the reduction of TTM concentrate was strongly related to the gasification reactivity of the reductant. Bitumite presented a better product index than wheat-straw biochar and coke, mainly because the gasification reactivity of bitumite was better than that of the other reductants. In addition, high temperatures were not beneficial to embedding direct reduction because of the emergence of a molten phase and iron-joined crystals, which in turn reduced the diffusion rate of the reducing gas and impeded the reduction reaction in the central area of the roasted briquette. The use of bitumite as the reductant at a C/Fe molar ratio of 1.4 and a reduction temperature of 1200°C for 120 min resulted in direct-reduction iron powder assaying 90.28 wt% TFe and 0.91 wt% TiO_2 with an iron recovery of 91.83% and titanium concentrate assaying 46.01 wt% TiO_2 with a TiO_2 recovery of 91.19%. Titanium existed mainly in the form of anosovite and ilmenite in the titanium concentrate.展开更多
Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Intern...Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Internet. Through virtualization, multiple customized virtual networks(VNs), requested by users, are allowed to coexist on the underlying substrate networks(SNs). In addition, the virtualization scheme contributes to sharing underlying physical resources simultaneously and seamlessly. However, multiple technical issues still stand in the way of NV successful implementation. One key technical issue is virtual network embedding(VNE), known as the resource allocation problem for NV. This paper conducts a survey of embedding algorithms for VNE problem. At first, the NV business model for VNE problem is presented. Then, the latest VNE problem description is presented. Main performance metrics for evaluating embedding algorithms are also involved. Afterwards, existing VNE algorithms are detailed, according to the novel proposed category approach. Next, key future research aspects of embedding algorithms are listed out. Finally, the paper is briefly concluded.展开更多
The aim of the study was to develop actarit double-layered osmotic pump tablets to overcome the weak points of actarit common tablets, such as short half-life and large plasma concentration fluctuations. Single factor...The aim of the study was to develop actarit double-layered osmotic pump tablets to overcome the weak points of actarit common tablets, such as short half-life and large plasma concentration fluctuations. Single factor experiment and orthogonal test were applied to optimize the formulation;the pharmacokinetic study was performed in beagle dogs adopting actarit common tablets as reference tablets. The optimal formulation was as follows: drug layer: 150 mg actarit, 240 mg PEO-N80, 50 mg NaCl;push layer: 140 mg PEO-WSR303, 20 mg NaCl;coating solution: 30 g cellulose acetate and 6 g PEG 4000 in 1000 ml 94% acetone solution, 60 mg coating weight gain. The pharmacokinetic study showed that T max was prolonged by the contrast of commercial common tablets with constant drug release rate, but the bioavailability was equivalent. And a good in vivo –in vitro correlation of the actarit osmotic pump tablets was also established. The designed actarit osmotic pump tablets can be applied for rheumatoid arthritis, proposing a promising replacement for the marked common products.展开更多
基金supports from the International Continental Scientific Drilling Programfunded by the National Natural Science Foundation of China(Grant Nos.41790453,41472304,42102129,42102135 and 41972313)+2 种基金Natural Science Foundation of Jilin Province(Grant No.20170101001JC)the National Key Research&Development Program of China(Grant No.2019YFC0605402)China Geological Survey(Grant No.DD20189702)。
文摘The Songliao Basin(SLB)covers an area of approximately 260,000 km2in northeastern Asia and preserves a continuous and complete Cretaceous terrestrial record(Wang et al.,2021).The region is the most important petroliferous sedimentary basin in China because of its continual annual oil and gas equivalent production of tens of millions of tons(ca.220–440 million barrels per year)since 1959.The SLB was previously thought to have developed on Hercynian basement and accumulated continuous sedimentary deposits during the Late Jurassic and Cretaceous(Wan et al.,2013;Wang et al.,2016).
基金Fund by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China (No.2018YFD1101002-03)。
文摘Double-layered microcapsule corrosion inhibitors were developed by sodium monofluorophosphate as the core material,polymethyl methacrylate as the inner wall material,and polyvinyl alcohol as the outer wall material combining the solvent evaporation method and spray drying method.The protection by the outer capsule wall was used to prolong the service life of the corrosion inhibitor.The dispersion,encapsulation,thermal stability of microcapsules,and the degradation rate of capsule wall in concrete pore solution were analyzed by ultra-deep field microscopy,scanning electron microscopy,thermal analyzer,and sodium ion release rate analysis.The microcapsules were incorporated into mortar samples containing steel reinforcement,and the effects of double-layered microcapsule corrosion inhibitors on the performance of the cement matrix and the actual corrosion-inhibiting effect were analyzed.The experimental results show that the double-layered microcapsules have a moderate particle size and uniform distribution,and the capsules were completely wrapped.The microcapsules as a whole have good thermal stability below 230 ℃.The monolayer membrane structure microcapsules completely broke within 1 day in the simulated concrete pore solution,and the double-layer membrane structure prolonged the service life of the microcapsules to 80 days in the simulated concrete pore solution before the core material was completely released.The mortar samples containing steel reinforcement incorporated with the double-layered microcapsule corrosion inhibitors still maintained a higher corrosion potential than the monolayer microcapsule corrosion inhibitors control group at 60 days.The incorporation of double-layered microcapsules into the cement matrix has no significant adverse effect on the setting time and early strength.
基金supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148)the CCF-Baidu Open Fund(No.202312)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金supported by the National Natural Science Foundation of China(Grant Nos.92152102 and 92152202)the Advanced Jet Propulsion Innovation Center/AEAC(Grant No.HKCX2022-01-010)。
文摘Identification of underlying partial differential equations(PDEs)for complex systems remains a formidable challenge.In the present study,a robust PDE identification method is proposed,demonstrating the ability to extract accurate governing equations under noisy conditions without prior knowledge.Specifically,the proposed method combines gene expression programming,one type of evolutionary algorithm capable of generating unseen terms based solely on basic operators and functional terms,with symbolic regression neural networks.These networks are designed to represent explicit functional expressions and optimize them with data gradients.In particular,the specifically designed neural networks can be easily transformed to physical constraints for the training data,embedding the discovered PDEs to further optimize the metadata used for iterative PDE identification.The proposed method has been tested in four canonical PDE cases,validating its effectiveness without preliminary information and confirming its suitability for practical applications across various noise levels.
基金The State Grid Technology Project(No.5108202340042A-1-1-ZN).
文摘To solve the low efficiency of approximate queries caused by the large sizes of the knowledge graphs in the real world,an embedding-based approximate query method is proposed.First,the nodes in the query graph are classified according to the degrees of approximation required for different types of nodes.This classification transforms the query problem into three constraints,from which approximate information is extracted.Second,candidates are generated by calculating the similarity between embeddings.Finally,a deep neural network model is designed,incorporating a loss function based on the high-dimensional ellipsoidal diffusion distance.This model identifies the distance between nodes using their embeddings and constructs a score function.k nodes are returned as the query results.The results show that the proposed method can return both exact results and approximate matching results.On datasets DBLP(DataBase systems and Logic Programming)and FUA-S(Flight USA Airports-Sparse),this method exhibits superior performance in terms of precision and recall,returning results in 0.10 and 0.03 s,respectively.This indicates greater efficiency compared to PathSim and other comparative methods.
基金supported by the National Natural Science Foundation of China(32088101)National key Research and Development Program of China(2017YFC1700105,2021YFA1301603).
文摘Objective:To elucidate the biological basis of the heart qi deficiency(HQD)pattern,an in-depth understanding of which is essential for improving clinical herbal therapy.Methods: We predicted and characterized HQD pattern genes using the new strategy,TCM-HIN2Vec,which involves heterogeneous network embedding and transcriptomic experiments.First,a heterogeneous network of traditional Chinese medicine(TCM)patterns was constructed using public databases.Next,we predicted HQD pattern genes using a heterogeneous network-embedding algorithm.We then analyzed the functional characteristics of HQD pattern genes using gene enrichment analysis and examined gene expression levels using RNA-seq.Finally,we identified TCM herbs that demonstrated enriched interactions with HQD pattern genes via herbal enrichment analysis.Results: Our TCM-HIN2Vec strategy revealed that candidate genes associated with HQD pattern were significantly enriched in energy metabolism,signal transduction pathways,and immune processes.Moreover,we found that these candidate genes were significantly differentially expressed in the transcriptional profile of mice model with heart failure with a qi deficiency pattern.Furthermore,herbal enrichment analysis identified TCM herbs that demonstrated enriched interactions with the top 10 candidate genes and could potentially serve as drug candidates for treating HQD.Conclusion: Our results suggested that TCM-HIN2Vec is capable of not only accurately identifying HQD pattern genes,but also deciphering the basis of HQD pattern.Furthermore our finding indicated that TCM-HIN2Vec may be further expanded to develop other patterns,leading to a new approach aimed at elucidating general TCM patterns and developing precision medicine.
基金Supported by the National Natural Science Foundation of China(No.62203390)the Science and Technology Project of China TobaccoZhejiang Industrial Co.,Ltd(No.ZJZY2022E004)。
文摘In the tobacco industry,insider employee attack is a thorny problem that is difficult to detect.To solve this issue,this paper proposes an insider threat detection method based on heterogeneous graph embedding.First,the interrelationships between logs are fully considered,and log entries are converted into heterogeneous graphs based on these relationships.Second,the heterogeneous graph embedding is adopted and each log entry is represented as a low-dimensional feature vector.Then,normal logs and malicious logs are classified into different clusters by clustering algorithm to identify malicious logs.Finally,the effectiveness and superiority of the method is verified through experiments on the CERT dataset.The experimental results show that this method has better performance compared to some baseline methods.
基金Project supported by the National Natural Science Foundation of China(Grant No.62061014)the Natural Science Foundation of Liaoning province of China(Grant No.2020-MS-274).
文摘Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works.
文摘This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.
基金National Key Science & Technology Special Projects(Grant No.2008ZX05000-004)CNPC Projects(Grant No.2008E-0610-10).
文摘How to extract optimal composite attributes from a variety of conventional seismic attributes to detect reservoir features is a reservoir predication key,which is usually solved by reducing dimensionality.Principle component analysis(PCA) is the most widely-used linear dimensionality reduction method at present.However,the relationships between seismic attributes and reservoir features are non-linear,so seismic attribute dimensionality reduction based on linear transforms can't solve non-linear problems well,reducing reservoir prediction precision.As a new non-linear learning method,manifold learning supplies a new method for seismic attribute analysis.It can discover the intrinsic features and rules hidden in the data by computing low-dimensional,neighborhood-preserving embeddings of high-dimensional inputs.In this paper,we try to extract seismic attributes using locally linear embedding(LLE),realizing inter-horizon attributes dimensionality reduction of 3D seismic data first and discuss the optimization of its key parameters.Combining model analysis and case studies,we compare the dimensionality reduction and clustering effects of LLE and PCA,both of which indicate that LLE can retain the intrinsic structure of the inputs.The composite attributes and clustering results based on LLE better characterize the distribution of sedimentary facies,reservoir,and even reservoir fluids.
文摘Objective To compare the therapeutic effect of catgut embedding combined with diet plus exercise with that of diet plus exercise in treating simple obesity complicated with abnormal blood fat. Methods A prescription of diet plus exercise was given to the patients in a control group, and catgut embedding was added to the prescription in a treatment group. It was given once every 15 days for the 1st three treatments, and once every month for the 2^nd three treatments. Six treatments constituted a therapeutic course. Body weight and blood fat were measured before and half a year since treatment. Results After treatment, BMI, TO, TG and LDL were very significantly improved in the treatment group (P〈0.01), and BMI and TG were very significantly (P〈0.01) and TO and LDL were significantly (P〈0.05) improved in the control group. HDL was not obviously improved in both groups (P〉0.05). The improvement of TO, TG and LDL in the treatment group was significantly more than that in the control group (P〈0.01), but no difference in improvement of BMI and HDL was found between the two groups (P〉0.05). Conclusion The therapy of diet plus exercise was effective in body weight reduction and lowering blood fat in patients with simple obesity complicated with abnormal blood fat, and catgut embedding used in combination was even better in lowering blood fat.
基金supported by NSFC (11071096, 11171129)NSF of Hubei Province, China (T201103)
文摘Let Qn,k (n 〉 3, 1 〈 k ≤ n - 1) be an n-dimensional enhanced hypercube which is an attractive variant of the hypercube and can be obtained by adding some complementary edges, fv and fe be the numbers of faulty vertices and faulty edges, respectively. In this paper, we give three main results. First, a fault-free path P[u, v] of length at least 2n - 2fv - 1 (respectively, 2n - 2fv - 2) can be embedded on Qn,k with fv + f≤ n- 1 when dQn,k (u, v) is odd (respectively, dQ,~,k (u, v) is even). Secondly, an Q,,k is (n - 2) edgefault-free hyper Hamiltonianaceable when n ( 3) and k have the same parity. Lastly, a fault-free cycle of length at least 2n - 2fv can be embedded on Qn,k with f~ 〈 n - 1 and fv+f≤2n-4.
基金financially supported by the National Natural Science Foundation of China (Nos. 51474018 and 51674018)
文摘Iron and titanium were recovered from beach titanomagnetite(TTM) concentrate by embedding direct reduction and magnetic separation. The reduction products and the effects of the reductant type and reduction temperature on the reduction behavior were investigated. The results showed that the reduction of TTM concentrate was strongly related to the gasification reactivity of the reductant. Bitumite presented a better product index than wheat-straw biochar and coke, mainly because the gasification reactivity of bitumite was better than that of the other reductants. In addition, high temperatures were not beneficial to embedding direct reduction because of the emergence of a molten phase and iron-joined crystals, which in turn reduced the diffusion rate of the reducing gas and impeded the reduction reaction in the central area of the roasted briquette. The use of bitumite as the reductant at a C/Fe molar ratio of 1.4 and a reduction temperature of 1200°C for 120 min resulted in direct-reduction iron powder assaying 90.28 wt% TFe and 0.91 wt% TiO_2 with an iron recovery of 91.83% and titanium concentrate assaying 46.01 wt% TiO_2 with a TiO_2 recovery of 91.19%. Titanium existed mainly in the form of anosovite and ilmenite in the titanium concentrate.
基金supported by the National Key Research and Development of China under Grant 2018YFC1314903the National Natural Science Foundation of China under Grant 61372124 and Grant 61427801
文摘Network virtualization(NV) is pushed forward by its proponents as a crucial attribute of next generation network, aiming at overcoming the gradual ossification of current networks, particularly to the worldwide Internet. Through virtualization, multiple customized virtual networks(VNs), requested by users, are allowed to coexist on the underlying substrate networks(SNs). In addition, the virtualization scheme contributes to sharing underlying physical resources simultaneously and seamlessly. However, multiple technical issues still stand in the way of NV successful implementation. One key technical issue is virtual network embedding(VNE), known as the resource allocation problem for NV. This paper conducts a survey of embedding algorithms for VNE problem. At first, the NV business model for VNE problem is presented. Then, the latest VNE problem description is presented. Main performance metrics for evaluating embedding algorithms are also involved. Afterwards, existing VNE algorithms are detailed, according to the novel proposed category approach. Next, key future research aspects of embedding algorithms are listed out. Finally, the paper is briefly concluded.
文摘The aim of the study was to develop actarit double-layered osmotic pump tablets to overcome the weak points of actarit common tablets, such as short half-life and large plasma concentration fluctuations. Single factor experiment and orthogonal test were applied to optimize the formulation;the pharmacokinetic study was performed in beagle dogs adopting actarit common tablets as reference tablets. The optimal formulation was as follows: drug layer: 150 mg actarit, 240 mg PEO-N80, 50 mg NaCl;push layer: 140 mg PEO-WSR303, 20 mg NaCl;coating solution: 30 g cellulose acetate and 6 g PEG 4000 in 1000 ml 94% acetone solution, 60 mg coating weight gain. The pharmacokinetic study showed that T max was prolonged by the contrast of commercial common tablets with constant drug release rate, but the bioavailability was equivalent. And a good in vivo –in vitro correlation of the actarit osmotic pump tablets was also established. The designed actarit osmotic pump tablets can be applied for rheumatoid arthritis, proposing a promising replacement for the marked common products.