Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune s...Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune system (BIS) according to the similarity of the defense mechanism and characteristics between the CASoSSWF and the BIS, and then designs the models of components and the architecture for a monitoring agent, a regulating agent, a killer agent, a pre-warning agent and a communicating agent by making use of the theories and methods of the artificial immune system, the multi-agent system (MAS), the vaccine and the danger theory (DT). Moreover a new immune multi-agent model using vaccine based on DT (IMMUVBDT) for the cooperative air-defense SoS is advanced. The immune response and immune mechanism of the CASoSSWF are analyzed. The model has a capability of memory, evolution, commendable dynamic environment adaptability and self-learning, and embodies adequately the cooperative air-defense mechanism for the CASoSSWF. Therefore it shows a novel idea for the CASoSSWF which can provide conception models for a surface warship formation operation simulation system.展开更多
In this paper,different kinds of enzymes,immune factors and regulatory factors of the immune system of crustaceans are summarized and then combed systematically and thoroughly. According to the mutual influence and ef...In this paper,different kinds of enzymes,immune factors and regulatory factors of the immune system of crustaceans are summarized and then combed systematically and thoroughly. According to the mutual influence and effects of these factors,different symbolic forms are introduced to express the effects,and ultimately the whole node graph of the system is obtained. The graph theory can be used for further researches on the immune system of crustacean.展开更多
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach...In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.展开更多
The basic genetic characteristics, important functional genes, and entire transcriptome of Solen grandis Dunker were investigated by constructing a full-length cDNA library with the ‘switching mechanism at the 5'...The basic genetic characteristics, important functional genes, and entire transcriptome of Solen grandis Dunker were investigated by constructing a full-length cDNA library with the ‘switching mechanism at the 5'-end of the RNA transcript'(SMART) technique. Total RNA was isolated from the immune-relevant tissues, gills and hemocytes, using the Trizol reagent, and cDNA fragments were digested with Sfi I before being ligated to the pBluescript II SK* vector. The cDNA library had a titer of 1048 cfu μL-1 and a storage capacity of 1.05×106 cfu. Approximately 98% of the clones in the library were recombinants, and the fragment lengths of insert cDNA ranged from 0.8 kb to 3.0 kb. A total of 2038 expressed sequence tags were successfully sequenced and clustered into 965 unigenes. BLASTN analysis showed that 240 sequences were highly similar to the known genes(E-value < 1e-5; percent identity >80%), accounting for 25% of the total unigenes. According to the Gene Ontology, these unigenes were related to several biological processes, including cell structure, signal transport, protein synthesis, transcription, energy metabolism, and immunity. Fifteen of the identified sequences were related to defense and immunity. The full-length cDNA sequence of HSC70 was obtained. The cDNA library of S. grandis provided a useful resource for future researches of functional genomics related to stress tolerance, immunity, and other physiological activities.展开更多
Objective: To investigate the biological basis of qi, blood and vessel in immune thrombocytopenia(ITP) patients with syndrome of qi failing to govern blood(SQFGB) based on traditional Chinese medicine.Methods: A total...Objective: To investigate the biological basis of qi, blood and vessel in immune thrombocytopenia(ITP) patients with syndrome of qi failing to govern blood(SQFGB) based on traditional Chinese medicine.Methods: A total of 52 ITP patients with SQFCB were enrolled and divided into bleeding group(38 cases) and non-bleeding group(14 cases).Bleeding group was further divided into mild qi deficiency group(25 cases) and moderate/severe qi deficiency group(13 cases) based on Chinese Medicine syndrome score.20 healthy volunteer were recruited as control group.The count of platelet(PLT) was taken as the blood related indicator.The expressions of cytokines including IL-1β, IL-17 A, TNF-α, CD40 L, and TGF-β, detected by Aim Plex Multiple Immunoassays for Flow, were taken as the qi related indicators.The expressions of VEGF-A, detected by Aim Plex Multiple Immunoassays for Flow and NO, NOS, and ET-1 detected by ELISA, were taken as the vessel related indicators.Results: As compared to the control group, the count of PLT, taken as the blood related indicator, was significantly lower in ITP group patients with SQFCB(P<0.05).The expression levels of IL-17 A and TNF-α, taken as the qi related indicators, were significantly higher, while those of CD40 L, IL-1β, and TGF-β, also taken as the qi related indicators, were significantly lower in ITP patients with SQFCB, respectively(P<0.05).The expression levels of NO and ET-1, taken as the vessel related indicators, were significantly higher, while the expression levels of NOS and VEGF-A also taken as the vessel related indicators, were significantly lower in ITP patients with SQFCB, respectively(P<0.05).The count of PLT, taken as the blood related indicator, was significantly lower in moderate/severe group than those in mild group(P<0.05).The expression levels of CD40 L and TGF-β, taken as the qi related indicators, were also significantly lower in moderate/severe group than those in mild group, respectively(P<0.05).Conclusion: The count of PLT might be the biological basis of blood.The expressions of NO, NOS, ET-1 and VEGF-A might be the biological basis of vessel.The expressions of IL-1β, IL-17 A, TNF-α, TGF-β, and CD40 L may be the biological basis of qi.The expressions of CD40 L and TGF-β could reflect the degree of qi deficiency in ITP patients based on the theory of qi and blood.展开更多
[ Objective ] This study aimed to identify the immune system-related TOLL-like receptor family gene of Aherea pernyi, to lay the foundation for further investigating the immune mechanism of Antherea perny/. [ Method] ...[ Objective ] This study aimed to identify the immune system-related TOLL-like receptor family gene of Aherea pernyi, to lay the foundation for further investigating the immune mechanism of Antherea perny/. [ Method] Immune system-related TOLL-like receptor family gene of Antherea perny/was cloned for se- quencing and phylogenetic analysis ; in addition, expression variations of TOLL-like receptor family gene in Antherea pernyi infected with Nosema pernyi and Nosema bombycis were detected to analyze the differences in immunological reactivity of Antherea pernyi to Nosema infection. [ Result] Based on cDNA cloning and sequen- cing, an immune system-related gene fragment was isolated from Antherea pernyi, which is the most homologous to the ToUl gene in Toll signaling pathway of Bom- byx mot/according to the sequencing result and phylogenetic analysis, which is named ApTolll gene. Subsequently, Antherea pernyi pupae were injected respective- ly with Nosema bombycis and Nosema pernyi, fluorescent real-time quantitative PCR analysis showed that ApTolll was abundantly expressed in Antherea pernyi pupa 2 h after Nosema bombycis injection, which began to express in Antherea pernyi pupa 11 h after Nosema pernyi injection, indicating that the immune response time induced by various Nosema strains varies in Toll signaling pathway of Antherea perny/. [ Conclusion ] ApTolll gene of Antherea perny/was first cloned in this study, which provides reference for further investigating the immune mechanism of Antherea pernyi.展开更多
The human gut is the normal habitat of a lot of microorganisms; in the long process of evolution they have developed a symbiotic relationship with the host. Under normal circumstances they do not damage the health, wh...The human gut is the normal habitat of a lot of microorganisms; in the long process of evolution they have developed a symbiotic relationship with the host. Under normal circumstances they do not damage the health, which totally owes to the barrier functions of the integral intestinal mucosa. Intestinal lnucosal barriers are mainly composed of four parts: mechanical barrier, immune barrier, chemical and biological barrier. Each of these functions has corresponding structural basis, an important barrier to prevent harmful substances and pathogens in the gut into the inner environment of the body, and to maintain a stable internal environment.展开更多
Ambient temperature is an importa nt factor in flue ncing many physiological processes, in eluding antioxidant defense and immunity. In the present study, we tested the hypothesis that antioxidant defense and immunity...Ambient temperature is an importa nt factor in flue ncing many physiological processes, in eluding antioxidant defense and immunity. In the present study, we tested the hypothesis that antioxidant defense and immunity are suppressed by high and low temperature treatme nt in Bran dt's voles (Lasiopodomys brandtii). Thirty male voles were randomly assigned into different temperature groups (4, 23, and 32℃, n=10 for each group), with the treatment course lasting for 27 d. Results showed that low temperature in creased gross en ergy in take (GEI) and liver, heart, and kidney mass, but decreased body fat mass and dry carcass mass. With the decline in temperature, hydrogen peroxide (H2O2) concentration, which is indicative of reactive oxyge n species (ROS) levels, in creased in the liver, decreased in the heart, and was unchanged in the kidney, testis, and small intestine. Lipid peroxidation indicated by malonaldehyde (MDA) content in the liver, heart, kidney, testis, and small intestine did not differ among groups, implying that high and low temperature did not cause oxidative damage. Similarly, superoxide dismutase (SOD) and catalase (CAT) activities and total antioxidant capacity (TAOC) in the five tissues did not respond to low or high temperature, except for elevation of CAT activity in the testis upon cold exposure. Bacteria killing capacity, which is indicative of innate immunity, was nearly suppressed in the 4℃ group in contrast to the 23℃ group, whereas spleen mass and white blood cells were un affected by temperature treatment. The levels of testosterone, but not corticostero ne, were in flue need by temperature treatment, though neither were correlated with innate immunity, H2O2 and MDA levels, or SOD, CAT, and TAOC activity in any detected tissues. Overall, these results showed that temperature had different in flue nces on oxidative stress, an tioxida nt en zymes, and immunity, which depended on the tissues and parameters tested. Up-regulation or maintenance of an tioxida nt defe nse might be an importa nt mechanism for voles to survive highly variable environmental temperatures.展开更多
In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to p...In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to protect the security of whole system.In the proposed security defense system,the security is protected by the intelligent immunity through three functions,identification function,learning function,and regulation function,respectively.Meanwhile,a three process-based intelligent algorithm is proposed for the intelligent immunity system.Numerical simulations are given to prove the effeteness of the proposed approach.展开更多
Rabies virus(RABV)is an infectious and neurotropic pathogen that causes rabies and infects humans and almost all warm-blooded animals,posing a great threat to people and public safety.It is well known that innate immu...Rabies virus(RABV)is an infectious and neurotropic pathogen that causes rabies and infects humans and almost all warm-blooded animals,posing a great threat to people and public safety.It is well known that innate immunity is the critical first line of host defense against viral infection.It monitors the invading pathogens by recognizing the pathogen-associated molecular patterns and danger-associated molecular patterns through pattern-recognition receptors,leading to the production of type I interferons(IFNα/β),inflammatory cytokines,and chemokines,or the activation of autophagy or apoptosis to inhibit virus replication.In the case of RABV,the innate immune response is usually triggered when the skin or muscle is bitten or scratched.However,RABV has evolved many ways to escape or even hijack innate immune response to complete its own replication and eventually invades the central nervous system(CNS).Once RABV reaches the CNS,it cannot be wiped out by the immune system or any drugs.Therefore,a better understanding of the interplay between RABV and innate immu-nity is necessary to develop effective strategies to combat its infection.Here,we review the innate immune responses induced by RABV and illustrate the antagonism mechanisms of RABV to provide new insights for the control of rabies.展开更多
Objective To study the common pathogenesis of pneumonia and colitis using modern biological network analysis tools,and to explore the theory that the lung and large intestine are exteriorly and interiorly related.Meth...Objective To study the common pathogenesis of pneumonia and colitis using modern biological network analysis tools,and to explore the theory that the lung and large intestine are exteriorly and interiorly related.Methods The relevant target genes(hereinafter,“targets”)of pneumonia and colitis were separately queried on the GeneCards database.The main targets of the two diseases were then screened out according to their correlation scores and intersected to obtain those common to the two diseases.Metascape was used to analyze the main and common targets identified,and the Database for Annotation,Visualization and Integrated Discovery(DAVID)was used to enrich and analyze the common targets.Cytoscape 3.7.2 software was used to build the network diagram.Results In total,54 targets,such as TNF,IL-10,IL-6,IL-2,IL-4,TLR4,TLR2,CXCL8,IL-17A and IFNG,etc.,are common to pneumonia and colitis,which are mainly enriched in these processes such as cytokine–cytokine receptor interaction,the Tcell receptor signaling pathway,the Toll-like receptor signaling pathway and the Jak-STAT signaling pathway.The Metascape modular analysis identified 11 modules for pneumonia,six modules for colitis,and two modules for the common targets.Conclusions Pneumonia and colitis have the same pathogenic targets and mechanisms of action and finally interact with each other through inflammatory reactions and immune responses.This provides a probable molecular mechanism that explains the theory that the lung and large intestine are exteriorly and interiorly related.展开更多
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ...Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.展开更多
Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global supe...Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global superpest that mostly damages rice crops.Yeast-like symbionts(YLS)exist in the abdominal fat body tissue and are tightly associated with the development,growth,and reproduction of BPH.Our previous research demonstrated that mating behavior promotes the release of YLS from the fat body into the hemolymph in the BPH,thereby triggering an immune response.Additionally,the fitness costs related to life-history traits of BPH(such as survival rate)have a strong dependence on the relative abundance of YLS.However,the possible relationship between reproduction and the immune response in BPH has not been identified.In this study,an omics-based approach was used to analyze the transcriptome of fat body tissues in mated and unmated BPH at 72 h post-eclosion,from which two antimicrobial peptide genes,NlDefensin A(NlDfA)and NlDefensin B(NlDfB),were selected since they were highly expressed in mated BPH.Subsequently,the full-length cDNA sequences of the NlDfA and NlDfB genes were cloned and analyzed.qPCR results showed up-regulation of the NlDfA and NlDfB genes in mated BPH when compared to unmated BPH.Spatial-temporal expression analysis indicated that the NlDfA and NlDfB genes were expressed in all tissues and developmental stages,and they were most highly expressed in the fat body at 24 h post-eclosion.Moreover,the symbionts in BPH were significantly inhibited by the in vitro expression of the NlDfA and NlDfB proteins.Furthermore,RNA interference(RNAi)-mediated suppression of NlDfA and NlDfB dramatically increased the relative abundance of YLS in the fat body,while YLS in the hemolymph decreased significantly.These BPHs also displayed some fitness disadvantages in survival,fecundity,hatchability,and possibly the vertical transmission of YLS from hemolymph to egg.Our results indicated that mating could heighten the immunity of BPH by upregulating the expression of the NlDfA and NlDfB genes,which protect the host from pathogen challenges during reproduction.However,the reduced content of YLS may act as a fitness disadvantage in dictating the life-history traits of BPH.This work has significant theoretical and practical implications for the precise green control technology that involves crucial gene targeting,as well as for the“endosymbionts for pest control”strategy in insects.展开更多
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From ...To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry.展开更多
The complement system plays a crucial role in the innate defense against common pathogens. Activation of complement leads to robust and efficient proteolytic cascades, which terminate in opsonization and lysis of the ...The complement system plays a crucial role in the innate defense against common pathogens. Activation of complement leads to robust and efficient proteolytic cascades, which terminate in opsonization and lysis of the pathogen as well as in the generation of the classical inflammatory response through the production of potent proinflammatory molecules. More recently, however, the role of complement in the immune response has been expanded due to observations that link complement activation to adaptive immune responses. It is now appreciated that complement is a functional bridge between innate and adaptive immune responses that allows an integrated host defense to pathogenic challenges. As such, a study of its functions allows insight into the molecular underpinnings of host-pathogen interactions as well as the organization and orchestration of the host immune response. This review attempts to summarize the roles that complement plays in both innate and adaptive immune responses and the consequences of these interactions on host defense.展开更多
A comprehensive review of scientific literature has uncovered no reported cases of date palm trees infected by a virus and no viral infections have been reported by farmers. In spite of the hot and humid environment t...A comprehensive review of scientific literature has uncovered no reported cases of date palm trees infected by a virus and no viral infections have been reported by farmers. In spite of the hot and humid environment they inhabit, the abundance of viral infestations in the soil, other plants and organisms surrounding the trees and the frequency of importation and transplantation of these trees into the region. Such conditions should cause the date palms to also be infected. Notably, other palm trees do not exhibit the same level of innate viral immunity that is found in date palms. The date palm tree’s innate viral immunity is a virgin area in botanical research. The biological segment in date palm tree DNA that enables survival under genotoxic radiation also deserves further investigation. This field of study may enable the breeding of other economically important plants to improve desert ecology and economy, land management, agriculture and horticulture.展开更多
One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles...One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles, we illustrate how defense weapons, ballistic missiles, kill probability and effectiveness of defense(ED) are interrelated and how to understand this relationship for achieving the best allocation plan. Motivated by the queueing theory, in which the available resources are not sufficient to satisfy the demands placed upon them at all times, the layered deployed defense weapon is modeled as a queueing system to shoot Poisson arrived targets. Simultaneously, examples, of optimum intercepts allocation problems under different constraints are presented. The four theorems determine the allocation rules of intercepts to targets that maximize ED or minimize the cost to achieve a required ED.展开更多
The paper proposes that the evolutionary origin of religions is based on theory of mind as the product of interdependent division of labor between the forest specialist group (women and small children) and the woodlan...The paper proposes that the evolutionary origin of religions is based on theory of mind as the product of interdependent division of labor between the forest specialist group (women and small children) and the woodland specialist group (men) in early hominins who lived in the mixed forest-woodland habitat. To complement each other’s work without interfering each other’s work, one specialist group had to recognize (imagine) that the other specialist group existed to think for themselves and to do different works. The result was theory of mind which is to recognize (imagine) that the others exist to think for themselves. (The forest-woodland groups became the hunter-gatherer groups for the Homo species in the savanna habitat.) Under existential pressure, hominins invented imaginary specialists as imaginary agents who existed to think for themselves and to do different works in imaginary division of labor to enhance survival chance. The result was religion with imaginary behaviors. Therefore, religion is defined as a set of beliefs and behaviors based on theory of mind that produces a shared imagination to enhance survival chance under existential pressure. This paper proposes that the religious evolution consists of the premodern imaginative religion for local society habitat starting from bipedalism, the modern rational imaginative religion for regional society habitat starting from the Axial Age, and the postmodern diverse rational imaginative religion for global society habitat starting from the Information Revolution. In conclusion, the religious brain is the imaginative brain, and the religious social behaviors are imaginary social behaviors. The religious evolution is the evolution of human imagination to enhance survival chance under existential pressure, such as the religious reinforcement of social bonds to enhance the survival chance of social group and the religious relief of stress and anxiety to enhance the survival chance of individuals.展开更多
文摘Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative airdefense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune system (BIS) according to the similarity of the defense mechanism and characteristics between the CASoSSWF and the BIS, and then designs the models of components and the architecture for a monitoring agent, a regulating agent, a killer agent, a pre-warning agent and a communicating agent by making use of the theories and methods of the artificial immune system, the multi-agent system (MAS), the vaccine and the danger theory (DT). Moreover a new immune multi-agent model using vaccine based on DT (IMMUVBDT) for the cooperative air-defense SoS is advanced. The immune response and immune mechanism of the CASoSSWF are analyzed. The model has a capability of memory, evolution, commendable dynamic environment adaptability and self-learning, and embodies adequately the cooperative air-defense mechanism for the CASoSSWF. Therefore it shows a novel idea for the CASoSSWF which can provide conception models for a surface warship formation operation simulation system.
文摘In this paper,different kinds of enzymes,immune factors and regulatory factors of the immune system of crustaceans are summarized and then combed systematically and thoroughly. According to the mutual influence and effects of these factors,different symbolic forms are introduced to express the effects,and ultimately the whole node graph of the system is obtained. The graph theory can be used for further researches on the immune system of crustacean.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1804604).
文摘In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.
基金supported by the Shandong Program of Agriculture Thoroughbred Project to Xiangquan Liu,the Marine Special Research Foundation of China for Non-profit Public Industry(No.200805031)Taishan Scholar position funding of Aquatic Animal Nutrition and Feed to Linmin Zhang and NSFC funding(No.31202025)
文摘The basic genetic characteristics, important functional genes, and entire transcriptome of Solen grandis Dunker were investigated by constructing a full-length cDNA library with the ‘switching mechanism at the 5'-end of the RNA transcript'(SMART) technique. Total RNA was isolated from the immune-relevant tissues, gills and hemocytes, using the Trizol reagent, and cDNA fragments were digested with Sfi I before being ligated to the pBluescript II SK* vector. The cDNA library had a titer of 1048 cfu μL-1 and a storage capacity of 1.05×106 cfu. Approximately 98% of the clones in the library were recombinants, and the fragment lengths of insert cDNA ranged from 0.8 kb to 3.0 kb. A total of 2038 expressed sequence tags were successfully sequenced and clustered into 965 unigenes. BLASTN analysis showed that 240 sequences were highly similar to the known genes(E-value < 1e-5; percent identity >80%), accounting for 25% of the total unigenes. According to the Gene Ontology, these unigenes were related to several biological processes, including cell structure, signal transport, protein synthesis, transcription, energy metabolism, and immunity. Fifteen of the identified sequences were related to defense and immunity. The full-length cDNA sequence of HSC70 was obtained. The cDNA library of S. grandis provided a useful resource for future researches of functional genomics related to stress tolerance, immunity, and other physiological activities.
基金the National Program on Key Basic Research Project(2015CB554403)
文摘Objective: To investigate the biological basis of qi, blood and vessel in immune thrombocytopenia(ITP) patients with syndrome of qi failing to govern blood(SQFGB) based on traditional Chinese medicine.Methods: A total of 52 ITP patients with SQFCB were enrolled and divided into bleeding group(38 cases) and non-bleeding group(14 cases).Bleeding group was further divided into mild qi deficiency group(25 cases) and moderate/severe qi deficiency group(13 cases) based on Chinese Medicine syndrome score.20 healthy volunteer were recruited as control group.The count of platelet(PLT) was taken as the blood related indicator.The expressions of cytokines including IL-1β, IL-17 A, TNF-α, CD40 L, and TGF-β, detected by Aim Plex Multiple Immunoassays for Flow, were taken as the qi related indicators.The expressions of VEGF-A, detected by Aim Plex Multiple Immunoassays for Flow and NO, NOS, and ET-1 detected by ELISA, were taken as the vessel related indicators.Results: As compared to the control group, the count of PLT, taken as the blood related indicator, was significantly lower in ITP group patients with SQFCB(P<0.05).The expression levels of IL-17 A and TNF-α, taken as the qi related indicators, were significantly higher, while those of CD40 L, IL-1β, and TGF-β, also taken as the qi related indicators, were significantly lower in ITP patients with SQFCB, respectively(P<0.05).The expression levels of NO and ET-1, taken as the vessel related indicators, were significantly higher, while the expression levels of NOS and VEGF-A also taken as the vessel related indicators, were significantly lower in ITP patients with SQFCB, respectively(P<0.05).The count of PLT, taken as the blood related indicator, was significantly lower in moderate/severe group than those in mild group(P<0.05).The expression levels of CD40 L and TGF-β, taken as the qi related indicators, were also significantly lower in moderate/severe group than those in mild group, respectively(P<0.05).Conclusion: The count of PLT might be the biological basis of blood.The expressions of NO, NOS, ET-1 and VEGF-A might be the biological basis of vessel.The expressions of IL-1β, IL-17 A, TNF-α, TGF-β, and CD40 L may be the biological basis of qi.The expressions of CD40 L and TGF-β could reflect the degree of qi deficiency in ITP patients based on the theory of qi and blood.
基金Supported by Key Project of Ministry of Education of China(210180)National Natural Science Foundation of China(31001037)
文摘[ Objective ] This study aimed to identify the immune system-related TOLL-like receptor family gene of Aherea pernyi, to lay the foundation for further investigating the immune mechanism of Antherea perny/. [ Method] Immune system-related TOLL-like receptor family gene of Antherea perny/was cloned for se- quencing and phylogenetic analysis ; in addition, expression variations of TOLL-like receptor family gene in Antherea pernyi infected with Nosema pernyi and Nosema bombycis were detected to analyze the differences in immunological reactivity of Antherea pernyi to Nosema infection. [ Result] Based on cDNA cloning and sequen- cing, an immune system-related gene fragment was isolated from Antherea pernyi, which is the most homologous to the ToUl gene in Toll signaling pathway of Bom- byx mot/according to the sequencing result and phylogenetic analysis, which is named ApTolll gene. Subsequently, Antherea pernyi pupae were injected respective- ly with Nosema bombycis and Nosema pernyi, fluorescent real-time quantitative PCR analysis showed that ApTolll was abundantly expressed in Antherea pernyi pupa 2 h after Nosema bombycis injection, which began to express in Antherea pernyi pupa 11 h after Nosema pernyi injection, indicating that the immune response time induced by various Nosema strains varies in Toll signaling pathway of Antherea perny/. [ Conclusion ] ApTolll gene of Antherea perny/was first cloned in this study, which provides reference for further investigating the immune mechanism of Antherea pernyi.
文摘The human gut is the normal habitat of a lot of microorganisms; in the long process of evolution they have developed a symbiotic relationship with the host. Under normal circumstances they do not damage the health, which totally owes to the barrier functions of the integral intestinal mucosa. Intestinal lnucosal barriers are mainly composed of four parts: mechanical barrier, immune barrier, chemical and biological barrier. Each of these functions has corresponding structural basis, an important barrier to prevent harmful substances and pathogens in the gut into the inner environment of the body, and to maintain a stable internal environment.
基金supported by the National Natural Science Foundation of China(31770444)the State Key Laboratory of Integrated Management of Pest Insects and Rodents(IPM1906)
文摘Ambient temperature is an importa nt factor in flue ncing many physiological processes, in eluding antioxidant defense and immunity. In the present study, we tested the hypothesis that antioxidant defense and immunity are suppressed by high and low temperature treatme nt in Bran dt's voles (Lasiopodomys brandtii). Thirty male voles were randomly assigned into different temperature groups (4, 23, and 32℃, n=10 for each group), with the treatment course lasting for 27 d. Results showed that low temperature in creased gross en ergy in take (GEI) and liver, heart, and kidney mass, but decreased body fat mass and dry carcass mass. With the decline in temperature, hydrogen peroxide (H2O2) concentration, which is indicative of reactive oxyge n species (ROS) levels, in creased in the liver, decreased in the heart, and was unchanged in the kidney, testis, and small intestine. Lipid peroxidation indicated by malonaldehyde (MDA) content in the liver, heart, kidney, testis, and small intestine did not differ among groups, implying that high and low temperature did not cause oxidative damage. Similarly, superoxide dismutase (SOD) and catalase (CAT) activities and total antioxidant capacity (TAOC) in the five tissues did not respond to low or high temperature, except for elevation of CAT activity in the testis upon cold exposure. Bacteria killing capacity, which is indicative of innate immunity, was nearly suppressed in the 4℃ group in contrast to the 23℃ group, whereas spleen mass and white blood cells were un affected by temperature treatment. The levels of testosterone, but not corticostero ne, were in flue need by temperature treatment, though neither were correlated with innate immunity, H2O2 and MDA levels, or SOD, CAT, and TAOC activity in any detected tissues. Overall, these results showed that temperature had different in flue nces on oxidative stress, an tioxida nt en zymes, and immunity, which depended on the tissues and parameters tested. Up-regulation or maintenance of an tioxida nt defe nse might be an importa nt mechanism for voles to survive highly variable environmental temperatures.
基金This work was supported by National Natural Science Foundation of China(No.61971026)the Fundamental Research Funds for the Central Universities(No.FRF-TP-18-008A3).
文摘In this paper,the security problem for the multi-access edge computing(MEC)network is researched,and an intelligent immunity-based security defense system is proposed to identify the unauthorized mobile users and to protect the security of whole system.In the proposed security defense system,the security is protected by the intelligent immunity through three functions,identification function,learning function,and regulation function,respectively.Meanwhile,a three process-based intelligent algorithm is proposed for the intelligent immunity system.Numerical simulations are given to prove the effeteness of the proposed approach.
基金National Natural Science Foundation of China,Grant/Award Number:31872487。
文摘Rabies virus(RABV)is an infectious and neurotropic pathogen that causes rabies and infects humans and almost all warm-blooded animals,posing a great threat to people and public safety.It is well known that innate immunity is the critical first line of host defense against viral infection.It monitors the invading pathogens by recognizing the pathogen-associated molecular patterns and danger-associated molecular patterns through pattern-recognition receptors,leading to the production of type I interferons(IFNα/β),inflammatory cytokines,and chemokines,or the activation of autophagy or apoptosis to inhibit virus replication.In the case of RABV,the innate immune response is usually triggered when the skin or muscle is bitten or scratched.However,RABV has evolved many ways to escape or even hijack innate immune response to complete its own replication and eventually invades the central nervous system(CNS).Once RABV reaches the CNS,it cannot be wiped out by the immune system or any drugs.Therefore,a better understanding of the interplay between RABV and innate immu-nity is necessary to develop effective strategies to combat its infection.Here,we review the innate immune responses induced by RABV and illustrate the antagonism mechanisms of RABV to provide new insights for the control of rabies.
基金funding support from the Guangdong Provincial Key Construction Unit Project of Traditional Chinese Medicine Pediatrics (Guangdong Traditional Chinese Medicine Office Letter [2018] No. 202)。
文摘Objective To study the common pathogenesis of pneumonia and colitis using modern biological network analysis tools,and to explore the theory that the lung and large intestine are exteriorly and interiorly related.Methods The relevant target genes(hereinafter,“targets”)of pneumonia and colitis were separately queried on the GeneCards database.The main targets of the two diseases were then screened out according to their correlation scores and intersected to obtain those common to the two diseases.Metascape was used to analyze the main and common targets identified,and the Database for Annotation,Visualization and Integrated Discovery(DAVID)was used to enrich and analyze the common targets.Cytoscape 3.7.2 software was used to build the network diagram.Results In total,54 targets,such as TNF,IL-10,IL-6,IL-2,IL-4,TLR4,TLR2,CXCL8,IL-17A and IFNG,etc.,are common to pneumonia and colitis,which are mainly enriched in these processes such as cytokine–cytokine receptor interaction,the Tcell receptor signaling pathway,the Toll-like receptor signaling pathway and the Jak-STAT signaling pathway.The Metascape modular analysis identified 11 modules for pneumonia,six modules for colitis,and two modules for the common targets.Conclusions Pneumonia and colitis have the same pathogenic targets and mechanisms of action and finally interact with each other through inflammatory reactions and immune responses.This provides a probable molecular mechanism that explains the theory that the lung and large intestine are exteriorly and interiorly related.
基金supported by the National Key R&D Program of China (2016YFF0204001)the National Key Technology Support Program (2015BAH08F02)+3 种基金the CCF-Venustech Hongyan Research Initiative (2016-009)the PAPD fundthe CICAEET fundthe Guizhou Provincial Key Laboratory of Public Big Data Program
文摘Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of security aims to unify the main branches of cyber security and establish a unified basic theory. This paper proposal an overview on the general theory of security, which is devoted to constructing a comprehensive model of network security. The hierarchical structure of the meridian-collateral tree is described. Shannon information theory is employed to build a cyberspace security model. Some central concepts of security, i.e., the attack and defense, are discussed and several general theorems on security are presented.
基金supported by the National Natural Science Foundation of China(U21A20223 and 32302354)the Zhejiang Provincial Programs for Science and Technology Development,China(2022C02047).
文摘Reproduction and immune defense are costly functions,and they are expected to tradeoff with each other to drive evolution.The brown planthopper(BPH),Nilaparvata lugens Stål(Hemiptera,Delphacidae),is a global superpest that mostly damages rice crops.Yeast-like symbionts(YLS)exist in the abdominal fat body tissue and are tightly associated with the development,growth,and reproduction of BPH.Our previous research demonstrated that mating behavior promotes the release of YLS from the fat body into the hemolymph in the BPH,thereby triggering an immune response.Additionally,the fitness costs related to life-history traits of BPH(such as survival rate)have a strong dependence on the relative abundance of YLS.However,the possible relationship between reproduction and the immune response in BPH has not been identified.In this study,an omics-based approach was used to analyze the transcriptome of fat body tissues in mated and unmated BPH at 72 h post-eclosion,from which two antimicrobial peptide genes,NlDefensin A(NlDfA)and NlDefensin B(NlDfB),were selected since they were highly expressed in mated BPH.Subsequently,the full-length cDNA sequences of the NlDfA and NlDfB genes were cloned and analyzed.qPCR results showed up-regulation of the NlDfA and NlDfB genes in mated BPH when compared to unmated BPH.Spatial-temporal expression analysis indicated that the NlDfA and NlDfB genes were expressed in all tissues and developmental stages,and they were most highly expressed in the fat body at 24 h post-eclosion.Moreover,the symbionts in BPH were significantly inhibited by the in vitro expression of the NlDfA and NlDfB proteins.Furthermore,RNA interference(RNAi)-mediated suppression of NlDfA and NlDfB dramatically increased the relative abundance of YLS in the fat body,while YLS in the hemolymph decreased significantly.These BPHs also displayed some fitness disadvantages in survival,fecundity,hatchability,and possibly the vertical transmission of YLS from hemolymph to egg.Our results indicated that mating could heighten the immunity of BPH by upregulating the expression of the NlDfA and NlDfB genes,which protect the host from pathogen challenges during reproduction.However,the reduced content of YLS may act as a fitness disadvantage in dictating the life-history traits of BPH.This work has significant theoretical and practical implications for the precise green control technology that involves crucial gene targeting,as well as for the“endosymbionts for pest control”strategy in insects.
文摘To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry.
文摘The complement system plays a crucial role in the innate defense against common pathogens. Activation of complement leads to robust and efficient proteolytic cascades, which terminate in opsonization and lysis of the pathogen as well as in the generation of the classical inflammatory response through the production of potent proinflammatory molecules. More recently, however, the role of complement in the immune response has been expanded due to observations that link complement activation to adaptive immune responses. It is now appreciated that complement is a functional bridge between innate and adaptive immune responses that allows an integrated host defense to pathogenic challenges. As such, a study of its functions allows insight into the molecular underpinnings of host-pathogen interactions as well as the organization and orchestration of the host immune response. This review attempts to summarize the roles that complement plays in both innate and adaptive immune responses and the consequences of these interactions on host defense.
文摘A comprehensive review of scientific literature has uncovered no reported cases of date palm trees infected by a virus and no viral infections have been reported by farmers. In spite of the hot and humid environment they inhabit, the abundance of viral infestations in the soil, other plants and organisms surrounding the trees and the frequency of importation and transplantation of these trees into the region. Such conditions should cause the date palms to also be infected. Notably, other palm trees do not exhibit the same level of innate viral immunity that is found in date palms. The date palm tree’s innate viral immunity is a virgin area in botanical research. The biological segment in date palm tree DNA that enables survival under genotoxic radiation also deserves further investigation. This field of study may enable the breeding of other economically important plants to improve desert ecology and economy, land management, agriculture and horticulture.
基金supported by the Military Graduate Student Foundation of Army
文摘One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles, we illustrate how defense weapons, ballistic missiles, kill probability and effectiveness of defense(ED) are interrelated and how to understand this relationship for achieving the best allocation plan. Motivated by the queueing theory, in which the available resources are not sufficient to satisfy the demands placed upon them at all times, the layered deployed defense weapon is modeled as a queueing system to shoot Poisson arrived targets. Simultaneously, examples, of optimum intercepts allocation problems under different constraints are presented. The four theorems determine the allocation rules of intercepts to targets that maximize ED or minimize the cost to achieve a required ED.
文摘The paper proposes that the evolutionary origin of religions is based on theory of mind as the product of interdependent division of labor between the forest specialist group (women and small children) and the woodland specialist group (men) in early hominins who lived in the mixed forest-woodland habitat. To complement each other’s work without interfering each other’s work, one specialist group had to recognize (imagine) that the other specialist group existed to think for themselves and to do different works. The result was theory of mind which is to recognize (imagine) that the others exist to think for themselves. (The forest-woodland groups became the hunter-gatherer groups for the Homo species in the savanna habitat.) Under existential pressure, hominins invented imaginary specialists as imaginary agents who existed to think for themselves and to do different works in imaginary division of labor to enhance survival chance. The result was religion with imaginary behaviors. Therefore, religion is defined as a set of beliefs and behaviors based on theory of mind that produces a shared imagination to enhance survival chance under existential pressure. This paper proposes that the religious evolution consists of the premodern imaginative religion for local society habitat starting from bipedalism, the modern rational imaginative religion for regional society habitat starting from the Axial Age, and the postmodern diverse rational imaginative religion for global society habitat starting from the Information Revolution. In conclusion, the religious brain is the imaginative brain, and the religious social behaviors are imaginary social behaviors. The religious evolution is the evolution of human imagination to enhance survival chance under existential pressure, such as the religious reinforcement of social bonds to enhance the survival chance of social group and the religious relief of stress and anxiety to enhance the survival chance of individuals.