Objective:Use network pharmacology to explore the anti-COVID-19 mechanism of Huashi Baidu Recipe,supplemented by molecular docking verification.Methods:Thorugh databases such as TCMSP,GeneCard,String,and software such...Objective:Use network pharmacology to explore the anti-COVID-19 mechanism of Huashi Baidu Recipe,supplemented by molecular docking verification.Methods:Thorugh databases such as TCMSP,GeneCard,String,and software such as Cytoscape,AutoDockVina,network relationships was established,and the binding ability of active ingredients and targets is calculated through molecular docking,and biological function enrichment analysis was conducted.Result:The ingredients in Huashi Baidu Recipe that had strong affinity with SARS-CoV-23CL hydrolase(3CLpro)and angiotensin converting enzyme 2(ACE2)receptors include Quercetin,Baicalein,Astragaloside IV,Wogonin and other ingredients;25 active ingredients which obtained by screening had strong affinity with targets such as IL6,IL1B,NOS2 and CCL2.The biological function enrichment analysis mainly focused on Th17,Th1 and Th2 cell differentiation,NF-κB,MAPK,TNF,IL-17signaling pathway,etc.Conclusion:The active ingredients of Huashi Baidu Recipe may inhibit the infection and replication of SARS-CoV-2 virus,regulate RAS system’balance,inhibit excessive immune inflammatory response,and prevent inflammatory storm from appearing to fight COVID-19.展开更多
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security application...Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security applications in the era of internet of things(IoT).In this review article,for achieving secure hardware systems in IoT,lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.By reviewing the state-of-the-art in three highlighted memristive application areas,i.e.memristive non-volatile memory,memristive reconfigurable logic computing and memristive artificial intelligent computing,their application-level impacts on the novel implementations of secret key generation,crypto functions and machine learning attacks are explored,respectively.For the low-power security applications in IoT,it is essential to understand how to best realize cryptographic circuitry using memristive circuitries,and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security.This review article aims to help researchers to explore security solutions,to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs.展开更多
The developing process of simulation technology is discussed in view of its development, maturation and further development. The applications of simulation technology in the fields of national economy are introduced. ...The developing process of simulation technology is discussed in view of its development, maturation and further development. The applications of simulation technology in the fields of national economy are introduced. Finally, the level and status quo of simulation technology home and overseas are analyzed, and its future trend in the new century is presented.展开更多
文章重点阐述信息与通信技术(Information and Communications Technology,ICT)基础设施监控系统存在的问题,如监控系统软硬件高度耦合、数据无法共享等,严重影响了监控系统的集约化管理、智能运营和运维等工作的开展。为解决这些问题,...文章重点阐述信息与通信技术(Information and Communications Technology,ICT)基础设施监控系统存在的问题,如监控系统软硬件高度耦合、数据无法共享等,严重影响了监控系统的集约化管理、智能运营和运维等工作的开展。为解决这些问题,提出了底端采集硬件白盒化、监控单元B接口和系统间C接口标准化等方案,以确保ICT基础设施实现集约化管理和智慧运营。展开更多
基金National Natural Science Foundation of China(No.81273662,81473592)。
文摘Objective:Use network pharmacology to explore the anti-COVID-19 mechanism of Huashi Baidu Recipe,supplemented by molecular docking verification.Methods:Thorugh databases such as TCMSP,GeneCard,String,and software such as Cytoscape,AutoDockVina,network relationships was established,and the binding ability of active ingredients and targets is calculated through molecular docking,and biological function enrichment analysis was conducted.Result:The ingredients in Huashi Baidu Recipe that had strong affinity with SARS-CoV-23CL hydrolase(3CLpro)and angiotensin converting enzyme 2(ACE2)receptors include Quercetin,Baicalein,Astragaloside IV,Wogonin and other ingredients;25 active ingredients which obtained by screening had strong affinity with targets such as IL6,IL1B,NOS2 and CCL2.The biological function enrichment analysis mainly focused on Th17,Th1 and Th2 cell differentiation,NF-κB,MAPK,TNF,IL-17signaling pathway,etc.Conclusion:The active ingredients of Huashi Baidu Recipe may inhibit the infection and replication of SARS-CoV-2 virus,regulate RAS system’balance,inhibit excessive immune inflammatory response,and prevent inflammatory storm from appearing to fight COVID-19.
基金supported by the DFG(German Research Foundation)Priority Program Nano Security,Project MemCrypto(Projektnummer 439827659/funding id DU 1896/2–1,PO 1220/15–1)the funding by the Fraunhofer Internal Programs under Grant No.Attract 600768。
文摘Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security applications in the era of internet of things(IoT).In this review article,for achieving secure hardware systems in IoT,lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.By reviewing the state-of-the-art in three highlighted memristive application areas,i.e.memristive non-volatile memory,memristive reconfigurable logic computing and memristive artificial intelligent computing,their application-level impacts on the novel implementations of secret key generation,crypto functions and machine learning attacks are explored,respectively.For the low-power security applications in IoT,it is essential to understand how to best realize cryptographic circuitry using memristive circuitries,and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security.This review article aims to help researchers to explore security solutions,to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs.
文摘The developing process of simulation technology is discussed in view of its development, maturation and further development. The applications of simulation technology in the fields of national economy are introduced. Finally, the level and status quo of simulation technology home and overseas are analyzed, and its future trend in the new century is presented.
文摘文章重点阐述信息与通信技术(Information and Communications Technology,ICT)基础设施监控系统存在的问题,如监控系统软硬件高度耦合、数据无法共享等,严重影响了监控系统的集约化管理、智能运营和运维等工作的开展。为解决这些问题,提出了底端采集硬件白盒化、监控单元B接口和系统间C接口标准化等方案,以确保ICT基础设施实现集约化管理和智慧运营。