BACKGROUND Cartilage defects are some of the most common causes of arthritis.Cartilage lesions caused by inflammation,trauma or degenerative disease normally result in osteochondral defects.Previous studies have shown...BACKGROUND Cartilage defects are some of the most common causes of arthritis.Cartilage lesions caused by inflammation,trauma or degenerative disease normally result in osteochondral defects.Previous studies have shown that decellularized extracellular matrix(ECM)derived from autologous,allogenic,or xenogeneic mesenchymal stromal cells(MSCs)can effectively restore osteochondral integrity.AIM To determine whether the decellularized ECM of antler reserve mesenchymal cells(RMCs),a xenogeneic material from antler stem cells,is superior to the currently available treatments for osteochondral defects.METHODS We isolated the RMCs from a 60-d-old sika deer antler and cultured them in vitro to 70%confluence;50 mg/mL L-ascorbic acid was then added to the medium to stimulate ECM deposition.Decellularized sheets of adipocyte-derived MSCs(aMSCs)and antlerogenic periosteal cells(another type of antler stem cells)were used as the controls.Three weeks after ascorbic acid stimulation,the ECM sheets were harvested and applied to the osteochondral defects in rat knee joints.RESULTS The defects were successfully repaired by applying the ECM-sheets.The highest quality of repair was achieved in the RMC-ECM group both in vitro(including cell attachment and proliferation),and in vivo(including the simultaneous regeneration of well-vascularized subchondral bone and avascular articular hyaline cartilage integrated with surrounding native tissues).Notably,the antler-stem-cell-derived ECM(xenogeneic)performed better than the aMSC-ECM(allogenic),while the ECM of the active antler stem cells was superior to that of the quiescent antler stem cells.CONCLUSION Decellularized xenogeneic ECM derived from the antler stem cell,particularly the active form(RMC-ECM),can achieve high quality repair/reconstruction of osteochondral defects,suggesting that selection of decellularized ECM for such repair should be focused more on bioactivity rather than kinship.展开更多
The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge t...The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.展开更多
Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the em...Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the emergence of vital membrane processes(Cooper and McNeil,2015).This relationship between basic cellular functioning and membrane repair highlights the fundamental significance of preserving membrane integrity for cellular life.展开更多
In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are...In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness.展开更多
Cesarean scar pregnancy(CSP)is a rare form of ectopic pregnancy that is defined as a pregnancy sac located within the scar of a previous cesarean section.Recurrent cesarean scar pregnancy(RCSP)is even more uncommon,1 ...Cesarean scar pregnancy(CSP)is a rare form of ectopic pregnancy that is defined as a pregnancy sac located within the scar of a previous cesarean section.Recurrent cesarean scar pregnancy(RCSP)is even more uncommon,1 with Hasegawa et al reporting the first RCSP in 2005.2 RCSP is a high-risk pregnancy condition with potential complications that include heavy bleeding,uterine rupture,and maternal shock.The exact incidence rates for CSP and RCSP are unknown,although the incidence of CSP is 1/2656–1/1800 of the total number of cesarean sections,and the incidence of RCSP can reach 6.9%–34.3%.3,4,5 With the promulgation of the second and third child policies in China,an increasing number of patients now manifest fertility needs after cesarean section.With improvements in examination methods and awareness of CSP,we also suspect that the rates of CSP and RCSP may be even higher.Unfortunately,there is no standard treatment for CSP.We herein report a case in which the patient was treated by combined hysteroscopic and laparoscopic uterine repair without scar resection during the third RCSP,and the fourth RCSP occurred 6 months later;the patient then selected expectant management.The outcome was a successful cesarean section delivery of a live baby at 34 weeks of gestation,and the uterus was successfully preserved.Placental pathology was examined after delivery and revealed that the chorionic villi penetrated deeply into the myometrium.展开更多
The repeated failures of any equipment or systems are modeled as a renewal process. The management needs an assessment of the number of future failures to allocate the resources needed for fast repairs. Based on the i...The repeated failures of any equipment or systems are modeled as a renewal process. The management needs an assessment of the number of future failures to allocate the resources needed for fast repairs. Based on the idea of expectation by conditioning, special Volterra-type integral equations are derived for general types of repairs, considering the length of repair and reduced degradation of the idle object. In addition to minimal repair and failure replacement, partial repairs are also discussed when the repair results in reduction of the number of future failures or decreases the effective age of the object. Numerical integration-based algorithm and simulation study are performed to solve the resulting integral equation. Since the geometry degradation in different dimensions of a rail track and controlling and maintaining defects are of importance, a numerical example using the rail industry data is conducted. Expected number of failures of different failure type modes in rail track is calculated within a two-year interval. Results show that within a two-year period, anticipated occurrences of cross level failures, surface failures, and DPI failures are 2.4, 3.8, and 5.8, respectively.展开更多
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e...The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.展开更多
Objective:Nucleotide excision repair(NER)plays a vital role in maintaining genome stability,and the effect of NER gene polymorphisms on hepatoblastoma susceptibility is still under investigation.This study aimed to ev...Objective:Nucleotide excision repair(NER)plays a vital role in maintaining genome stability,and the effect of NER gene polymorphisms on hepatoblastoma susceptibility is still under investigation.This study aimed to evaluate the relationship between NER gene polymorphisms and the risk of hepatoblastoma in Eastern Chinese Han children.Methods:In this five-center case-control study,we enrolled 966 subjects from East China(193 hepatoblastoma patients and 773 healthy controls).The TaqMan method was used to genotype 19 single nucleotide polymorphisms(SNPs)in NER pathway genes,including ERCC1,XPA,XPC,XPD,XPF,and XPG.Then,multivariate logistic regression analysis was performed,and odds ratios(ORs)and 95%confidence intervals(95%CIs)were utilized to assess the strength of associations.Results:Three SNPs were related to hepatoblastoma risk.XPC rs2229090 and XPD rs3810366 significantly contributed to hepatoblastoma risk according to the dominant model(adjusted OR=1.49,95%CI=1.07−2.08,P=0.019;adjusted OR=1.66,95%CI=1.12−2.45,P=0.012,respectively).However,XPD rs238406 conferred a significantly decreased risk of hepatoblastoma under the dominant model(adjusted OR=0.68,95%CI=0.49−0.95;P=0.024).Stratified analysis demonstrated that these significant associations were more prominent in certain subgroups.Moreover,there was evidence of functional implications of these significant SNPs suggested by online expression quantitative trait loci(eQTLs)and splicing quantitative trait loci(sQTLs)analysis.Conclusions:In summary,NER pathway gene polymorphisms(XPC rs2229090,XPD rs3810366,and XPD rs238406)are significantly associated with hepatoblastoma risk,and further research is required to verify these findings.展开更多
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul...Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.展开更多
Spent battery recycling has received considerable attention because of its economic and environmental potential.A large amount of retired graphite has been produced as the main electrode material,accompanied by a deta...Spent battery recycling has received considerable attention because of its economic and environmental potential.A large amount of retired graphite has been produced as the main electrode material,accompanied by a detailed exploration of the repair mechanism.However,they still suffer from unclear repair mechanisms and physicochemical evolution.In this study,spent graphite was repaired employing three methodologies:pickling-sintering,pyrogenic-recovery,and high-temperature sintering.Owing to the catalytic effect of the metal-based impurities and temperature control,the as-obtained samples displayed an ordered transformation,including the interlayer distance,crystalline degree,and grain size.As anodes of lithium ions batteries,the capacity of repaired samples reached up to 310 mA h g^(-1)above after 300loops at 1.0 C,similar to that of commercial graphite.Meanwhile,benefitting from the effective assembly of carbon atoms in internal structure of graphite at>1400℃,their initial coulombic efficiency were>87%.Even at 2.0 C,the capacity of samples remained approximately 244 mA h g^(-1)after 500 cycles.Detailed electrochemical and kinetic analyses revealed that a low temperature enhanced the isotropy,thereby enhancing the rate properties.Further,economic and environmental analyses revealed that the revenue obtained through suitable pyrogenic-recovering manners was approximately the largest value(5500$t^(-1)).Thus,this study is expected to clarify the in-depth effect of different repair methods on the traits of graphite,while offering all-round evaluations of repaired graphite.展开更多
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information ...Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users.Trust mechanisms serve as an effective solution to this issue.In recent years,many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes,incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area.In this paper,we propose a distributed vehicular network scheme based on trust scores.Specifically,the designed architecture partitions multiple vehicle regions into clusters.Then,cloud supervision systems(CSSs)verify the accuracy of the information transmitted by vehicles.Additionally,the trust scores for vehicles are calculated to reward or penalize them based on the trust evaluation model.Our proposed scheme demonstrates good scalability and effectively addresses the main cause of malicious information distribution among vehicles.Both theoretical and experimental analysis show that our scheme outperforms the compared schemes.展开更多
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism...First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy.展开更多
Probiotics participate in various physiological activities and contribute to body health.However,their viability and bioefficacy are adversely affected by gastrointestinal harsh conditions,such as gastric acid,bile sa...Probiotics participate in various physiological activities and contribute to body health.However,their viability and bioefficacy are adversely affected by gastrointestinal harsh conditions,such as gastric acid,bile salts and various enzymes.Fortunately,encapsulation based on various nanomaterials shows tremendous potential to protect probiotics.In this review,we introduced some novel encapsulation technologies involving nanomaterials in view of predesigned stability and viability,selective adhesion,smart release and colonization,and efficacy exertion of encapsulated probiotics.Furthermore,the interactions between encapsulated probiotics and the gastrointestinal tract were summarized and analyzed,with highlighting the regulatory mechanisms of encapsulated probiotics on intestinal mechanical barrier,chemical barrier,biological barrier and immune barrier.This review would benefit the food and pharmaceutical industries in preparation and utilization of multifunctional encapsulated probiotics.展开更多
As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have pro...As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have proper trust in medical machines.Intelligent machines that have applied machine learning(ML)technologies continue to penetrate deeper into the medical environment,which also places higher demands on intelligent healthcare.In order to make machines play a role in HMI in healthcare more effectively and make human‐machine cooperation more harmonious,the authors need to build good humanmachine trust(HMT)in healthcare.This article provides a systematic overview of the prominent research on ML and HMT in healthcare.In addition,this study explores and analyses ML and three important factors that influence HMT in healthcare,and then proposes a HMT model in healthcare.Finally,general trends are summarised and issues to consider addressing in future research on HMT in healthcare are identified.展开更多
Long non-coding RNAs(lncRNAs)have been implicated in cancer progression and drug resistance development.Moreover,there is evidence that lncRNA HOX transcript antisense intergenic RNA(HOTAIR)is involved in colorectal c...Long non-coding RNAs(lncRNAs)have been implicated in cancer progression and drug resistance development.Moreover,there is evidence that lncRNA HOX transcript antisense intergenic RNA(HOTAIR)is involved in colorectal cancer(CRC)progression.The present study aimed to examine the functional role of lncRNA HOTAIR in conferring radiotherapy resistance in CRC cells,as well as the underlying mechanism.The relative expression levels of HOTAIR were examined in 70 pairs of CRC tumor and para-cancerous tissues,as well as in radiosensitive and radioresistant samples.The correlations between HOTAIR expression levels and clinical features of patients with CRC were assessed using the Chi-square test.Functional assays such as cell proliferation,colony formation and apoptosis assays were conducted to determine the radiosensitivity in CRC cells with HOTAIR silencing after treatment with different doses of radiation.RNA pull-down assay andfluorescence in situ hybridization(FISH)were used to determine the interaction between HOTAIR and DNA damage response mediator ataxia-telangiectasia mutated-and Rad3-related(ATR).HOTAIR was significantly upregulated in CRC tumor tissues,especially in radioresistant tumor samples.The elevated expression of HOTAIR was correlated with more advanced histological grades,distance metastasis and the poor prognosis in patients with CRC.Silencing HOTAIR suppressed the proliferation and promoted apoptosis and radiosensitivity in CRC cells.HOTAIR knockdown also inhibited the tumorigenesis of CRC cells and enhanced the sensitivity to radiotherapy in a mouse xenograft model.Moreover,the data showed that HOTAIR could interact with ATR to regulate the DNA damage repair signaling pathway.Silencing HOTAIR impaired the ATR-ATR interacting protein(ATRIP)complex and signaling in cell cycle progression.Collectively,the present results indicate that lncRNA HOTAIR facilitates the DNA damage response pathway and promotes radioresistance in CRC cells by targeting ATR.展开更多
Repairs of corroded high-pressure pipelines are essential for fluids transportation under high pressure.One of the methods used in their repairs is the use of layered composites.The composite used must have the necess...Repairs of corroded high-pressure pipelines are essential for fluids transportation under high pressure.One of the methods used in their repairs is the use of layered composites.The composite used must have the necessary strength.Therefore,the experiments and analytical solutions presented in this paper are performed according to the relevant standards and codes,including ASME PCC-2,ASME B31.8S,ASME B31.4,ISO 24817 and ASME B31.G.In addition,the experimental tests are replicated numerically using the finite element method.Setting the strain gauges at different distances from the defect location,can reduce the nonlinear effects,deformation,and fluctuations due to the high pressure.The direct relationship between the depth of an axial defect and the stress concentration is observed at the inner side edges of the defect.Composite reparation reduces the non-linearities related to the sharp variation of the geometry and a more reliable numerical simulation could be performed.展开更多
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra...Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss.展开更多
The conserved DNA damage repair complex,MMS21-SMC5/6(Methyl methane sulfonate 21-Structural maintenance of chromosomes 5/6),has been extensively studied in yeast,animals,and plants.However,its role in phytopathogenic ...The conserved DNA damage repair complex,MMS21-SMC5/6(Methyl methane sulfonate 21-Structural maintenance of chromosomes 5/6),has been extensively studied in yeast,animals,and plants.However,its role in phytopathogenic fungi,particularly in the highly destructive rice blast fungus Magnaporthe oryzae,remains unknown.In this study,we functionally characterized the homologues of this complex,MoMMS21 and MoSMC5,in M.oryzae.We first demonstrated the importance of DNA damage repair in M.oryzae by showing that the DNA damage inducer phleomycin inhibited vegetative growth,infection-related development and pathogenicity in this fungus.Additionally,we discovered that MoMMS21 and MoSMC5 interacted in the nuclei,suggesting that they also function as a complex in M.oryzae.Gene deletion experiments revealed that both MoMMS21 and MoSMC5 are required for infection-related development and pathogenicity in M.oryzae,while only MoMMS21 deletion affected growth and sensitivity to phleomycin,indicating its specific involvement in DNA damage repair.Overall,our results provide insights into the roles of MoMMS21 and MoSMC5 in M.oryzae,highlighting their functions beyond DNA damage repair.展开更多
A new scour countermeasure using solidified slurry for offshore foundation has been proposed recently.Fluidized solidified slurry is pumped to seabed area around foundation for scour protection or pumped into the deve...A new scour countermeasure using solidified slurry for offshore foundation has been proposed recently.Fluidized solidified slurry is pumped to seabed area around foundation for scour protection or pumped into the developed scour holes for scour repair as the fluidized material solidifies gradually.In the pumping operation and solidification,the engineering behaviors of solidified slurry require to be considered synthetically for the reliable application in scour repair and protection of ocean engineering such as the pumpability related flow value,flow diffusion behavior related rheological property,anti-scour performance related retention rate in solidification and bearing capacity related strength property after solidification.In this study,a series of laboratory tests are conducted to investigate the effects of mix proportion(initial water content and binder content)on the flow value,rheological properties,density,retention rate of solidified slurry and unconfined compressive strength(UCS).The results reveal that the flow value increases with the water content and decreases with the binder amount.All the solidified slurry exhibits Bingham plastic behavior when the shear rate is larger than 5 s^(-1).The Bingham model has been employed to fit the rheology test results,and empirical formulas for obtaining the density,yield stress and viscosity are established,providing scientific support for the numerical assessment of flow and diffusion of solidified slurry.Retention rate of solidified slurry decreases with the water flow velocity and flow value,which means the pumpability of solidified slurry is contrary to anti-scour performance.The unconfined compressive strength after solidification reduces as the water content increases and binder content decreases.A design and application procedure of solidified soil for scour repair and protection is also proposed for engineering reference.展开更多
基金National Natural Science Foundation of China,No.U20A20403This study was conducted in accordance with the Animal Ethics Committee of the Institute of Antler Science and Product Technology,Changchun Sci-Tech University(AEC No:CKARI202309).
文摘BACKGROUND Cartilage defects are some of the most common causes of arthritis.Cartilage lesions caused by inflammation,trauma or degenerative disease normally result in osteochondral defects.Previous studies have shown that decellularized extracellular matrix(ECM)derived from autologous,allogenic,or xenogeneic mesenchymal stromal cells(MSCs)can effectively restore osteochondral integrity.AIM To determine whether the decellularized ECM of antler reserve mesenchymal cells(RMCs),a xenogeneic material from antler stem cells,is superior to the currently available treatments for osteochondral defects.METHODS We isolated the RMCs from a 60-d-old sika deer antler and cultured them in vitro to 70%confluence;50 mg/mL L-ascorbic acid was then added to the medium to stimulate ECM deposition.Decellularized sheets of adipocyte-derived MSCs(aMSCs)and antlerogenic periosteal cells(another type of antler stem cells)were used as the controls.Three weeks after ascorbic acid stimulation,the ECM sheets were harvested and applied to the osteochondral defects in rat knee joints.RESULTS The defects were successfully repaired by applying the ECM-sheets.The highest quality of repair was achieved in the RMC-ECM group both in vitro(including cell attachment and proliferation),and in vivo(including the simultaneous regeneration of well-vascularized subchondral bone and avascular articular hyaline cartilage integrated with surrounding native tissues).Notably,the antler-stem-cell-derived ECM(xenogeneic)performed better than the aMSC-ECM(allogenic),while the ECM of the active antler stem cells was superior to that of the quiescent antler stem cells.CONCLUSION Decellularized xenogeneic ECM derived from the antler stem cell,particularly the active form(RMC-ECM),can achieve high quality repair/reconstruction of osteochondral defects,suggesting that selection of decellularized ECM for such repair should be focused more on bioactivity rather than kinship.
基金supported by the National Natural Science Foundation of China(62072392)the National Natural Science Foundation of China(61972360)the Major Scientific and Technological Innovation Projects of Shandong Province(2019522Y020131).
文摘The development of the Internet of Things(IoT)has brought great convenience to people.However,some information security problems such as privacy leakage are caused by communicating with risky users.It is a challenge to choose reliable users with which to interact in the IoT.Therefore,trust plays a crucial role in the IoT because trust may avoid some risks.Agents usually choose reliable users with high trust to maximize their own interests based on reinforcement learning.However,trust propagation is time-consuming,and trust changes with the interaction process in social networks.To track the dynamic changes in trust values,a dynamic trust inference algorithm named Dynamic Double DQN Trust(Dy-DDQNTrust)is proposed to predict the indirect trust values of two users without direct contact with each other.The proposed algorithm simulates the interactions among users by double DQN.Firstly,CurrentNet and TargetNet networks are used to select users for interaction.The users with high trust are chosen to interact in future iterations.Secondly,the trust value is updated dynamically until a reliable trust path is found according to the result of the interaction.Finally,the trust value between indirect users is inferred by aggregating the opinions from multiple users through a Modified Collaborative Filtering Averagebased Similarity(SMCFAvg)aggregation strategy.Experiments are carried out on the FilmTrust and the Epinions datasets.Compared with TidalTrust,MoleTrust,DDQNTrust,DyTrust and Dynamic Weighted Heuristic trust path Search algorithm(DWHS),our dynamic trust inference algorithm has higher prediction accuracy and better scalability.
基金supported by the Novo Nordisk Foundation(NNF180C0034936)the Lundbeck Foundation(R380-2021-1262)(to CD and JN)。
文摘Loss of plasma membrane integrity can compromise cell functioning and viability.To countera ct this eminent threat,euka ryotic cells have developed efficient repair mechanisms,which seem to have co-evolved with the emergence of vital membrane processes(Cooper and McNeil,2015).This relationship between basic cellular functioning and membrane repair highlights the fundamental significance of preserving membrane integrity for cellular life.
基金supported by the National Natural Science Foundation of China(No.92267301).
文摘In recent years,the Industrial Internet and Industry 4.0 came into being.With the development of modern industrial intelligent manufacturing technology,digital twins,Web3 and many other digital entity applications are also proposed.These applications apply architectures such as distributed learning,resource sharing,and arithmetic trading,which make high demands on identity authentication,asset authentication,resource addressing,and service location.Therefore,an efficient,secure,and trustworthy Industrial Internet identity resolution system is needed.However,most of the traditional identity resolution systems follow DNS architecture or tree structure,which has the risk of a single point of failure and DDoS attack.And they cannot guarantee the security and privacy of digital identity,personal assets,and device information.So we consider a decentralized approach for identity management,identity authentication,and asset verification.In this paper,we propose a distributed trusted active identity resolution system based on the inter-planetary file system(IPFS)and non-fungible token(NFT),which can provide distributed identity resolution services.And we have designed the system architecture,identity service process,load balancing strategy and smart contract service.In addition,we use Jmeter to verify the performance of the system,and the results show that the system has good high concurrent performance and robustness.
基金supported by the“Pioneer”and“Leading Goose”R&D Program of Zhejiang(2023C03033,2024C03200).
文摘Cesarean scar pregnancy(CSP)is a rare form of ectopic pregnancy that is defined as a pregnancy sac located within the scar of a previous cesarean section.Recurrent cesarean scar pregnancy(RCSP)is even more uncommon,1 with Hasegawa et al reporting the first RCSP in 2005.2 RCSP is a high-risk pregnancy condition with potential complications that include heavy bleeding,uterine rupture,and maternal shock.The exact incidence rates for CSP and RCSP are unknown,although the incidence of CSP is 1/2656–1/1800 of the total number of cesarean sections,and the incidence of RCSP can reach 6.9%–34.3%.3,4,5 With the promulgation of the second and third child policies in China,an increasing number of patients now manifest fertility needs after cesarean section.With improvements in examination methods and awareness of CSP,we also suspect that the rates of CSP and RCSP may be even higher.Unfortunately,there is no standard treatment for CSP.We herein report a case in which the patient was treated by combined hysteroscopic and laparoscopic uterine repair without scar resection during the third RCSP,and the fourth RCSP occurred 6 months later;the patient then selected expectant management.The outcome was a successful cesarean section delivery of a live baby at 34 weeks of gestation,and the uterus was successfully preserved.Placental pathology was examined after delivery and revealed that the chorionic villi penetrated deeply into the myometrium.
文摘The repeated failures of any equipment or systems are modeled as a renewal process. The management needs an assessment of the number of future failures to allocate the resources needed for fast repairs. Based on the idea of expectation by conditioning, special Volterra-type integral equations are derived for general types of repairs, considering the length of repair and reduced degradation of the idle object. In addition to minimal repair and failure replacement, partial repairs are also discussed when the repair results in reduction of the number of future failures or decreases the effective age of the object. Numerical integration-based algorithm and simulation study are performed to solve the resulting integral equation. Since the geometry degradation in different dimensions of a rail track and controlling and maintaining defects are of importance, a numerical example using the rail industry data is conducted. Expected number of failures of different failure type modes in rail track is calculated within a two-year interval. Results show that within a two-year period, anticipated occurrences of cross level failures, surface failures, and DPI failures are 2.4, 3.8, and 5.8, respectively.
基金This project is partly funded by Science and Technology Project of State Grid Zhejiang Electric Power Co.,Ltd.“Research on active Security Defense Strategies for Distribution Internet of Things Based on Trustworthy,under Grant No.5211DS22000G”.
文摘The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.
基金supported by grants from the Innovation and Cultivation Fund Project of the Seventh Medical Center,PLA General Hospital(No.QZX-2023-7)Postdoctoral Science Foundation of China(No.2021M691649)Postdoctoral Science Foundation of Jiangsu Province(No.2021K524C).
文摘Objective:Nucleotide excision repair(NER)plays a vital role in maintaining genome stability,and the effect of NER gene polymorphisms on hepatoblastoma susceptibility is still under investigation.This study aimed to evaluate the relationship between NER gene polymorphisms and the risk of hepatoblastoma in Eastern Chinese Han children.Methods:In this five-center case-control study,we enrolled 966 subjects from East China(193 hepatoblastoma patients and 773 healthy controls).The TaqMan method was used to genotype 19 single nucleotide polymorphisms(SNPs)in NER pathway genes,including ERCC1,XPA,XPC,XPD,XPF,and XPG.Then,multivariate logistic regression analysis was performed,and odds ratios(ORs)and 95%confidence intervals(95%CIs)were utilized to assess the strength of associations.Results:Three SNPs were related to hepatoblastoma risk.XPC rs2229090 and XPD rs3810366 significantly contributed to hepatoblastoma risk according to the dominant model(adjusted OR=1.49,95%CI=1.07−2.08,P=0.019;adjusted OR=1.66,95%CI=1.12−2.45,P=0.012,respectively).However,XPD rs238406 conferred a significantly decreased risk of hepatoblastoma under the dominant model(adjusted OR=0.68,95%CI=0.49−0.95;P=0.024).Stratified analysis demonstrated that these significant associations were more prominent in certain subgroups.Moreover,there was evidence of functional implications of these significant SNPs suggested by online expression quantitative trait loci(eQTLs)and splicing quantitative trait loci(sQTLs)analysis.Conclusions:In summary,NER pathway gene polymorphisms(XPC rs2229090,XPD rs3810366,and XPD rs238406)are significantly associated with hepatoblastoma risk,and further research is required to verify these findings.
基金supported in part by the Chongqing Electronics Engineering Technology Research Center for Interactive Learningin part by the Chongqing key discipline of electronic informationin part by the Science and Technology Research Program of Chongqing Municipal Education Commission(KJQN202201630)。
文摘Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
基金financially supported by National Natural Science Foundation of China(52374288,52204298)Young Elite Scientists Sponsorship Program by China Association for Science and Technology(2022QNRC001)+2 种基金National Key Research and Development Program of China(2022YFC3900805-4/7)Hunan Provincial Education Office Foundation of China(No.21B0147)Collaborative Innovation Centre for Clean and Efficient Utilization of Strategic Metal Mineral Resources,Found of State Key Laboratory of Mineral Processing(BGRIMM-KJSKL-2017-13)。
文摘Spent battery recycling has received considerable attention because of its economic and environmental potential.A large amount of retired graphite has been produced as the main electrode material,accompanied by a detailed exploration of the repair mechanism.However,they still suffer from unclear repair mechanisms and physicochemical evolution.In this study,spent graphite was repaired employing three methodologies:pickling-sintering,pyrogenic-recovery,and high-temperature sintering.Owing to the catalytic effect of the metal-based impurities and temperature control,the as-obtained samples displayed an ordered transformation,including the interlayer distance,crystalline degree,and grain size.As anodes of lithium ions batteries,the capacity of repaired samples reached up to 310 mA h g^(-1)above after 300loops at 1.0 C,similar to that of commercial graphite.Meanwhile,benefitting from the effective assembly of carbon atoms in internal structure of graphite at>1400℃,their initial coulombic efficiency were>87%.Even at 2.0 C,the capacity of samples remained approximately 244 mA h g^(-1)after 500 cycles.Detailed electrochemical and kinetic analyses revealed that a low temperature enhanced the isotropy,thereby enhancing the rate properties.Further,economic and environmental analyses revealed that the revenue obtained through suitable pyrogenic-recovering manners was approximately the largest value(5500$t^(-1)).Thus,this study is expected to clarify the in-depth effect of different repair methods on the traits of graphite,while offering all-round evaluations of repaired graphite.
基金supported the by Anhui Provincial Natural Science Foundation under Grant 2308085MF223in part by the Open Fund of State Key Laboratory for Novel Software Technology under Grant KFKT2022B33+1 种基金in part by the by the Foundation of Yunnan Key Laboratory of Service Computing under Grant YNSC23106in part by the Key Project on Anhui Provincial Natural Science Study by Colleges and Universities under Grant 2023AH050495,2024AH051078 and Grant KJ2020A0513.
文摘Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users.Trust mechanisms serve as an effective solution to this issue.In recent years,many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes,incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area.In this paper,we propose a distributed vehicular network scheme based on trust scores.Specifically,the designed architecture partitions multiple vehicle regions into clusters.Then,cloud supervision systems(CSSs)verify the accuracy of the information transmitted by vehicles.Additionally,the trust scores for vehicles are calculated to reward or penalize them based on the trust evaluation model.Our proposed scheme demonstrates good scalability and effectively addresses the main cause of malicious information distribution among vehicles.Both theoretical and experimental analysis show that our scheme outperforms the compared schemes.
基金This work is supported by the 2022 National Key Research and Development Plan“Security Protection Technology for Critical Information Infrastructure of Distribution Network”(2022YFB3105100).
文摘First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy.
基金supported by the National Key Research and Development Program(2019YFC1606704)the Key Research and Development Program of Shaanxi Province(2022NY-013)+1 种基金National Natural Science Foundation of China(31801653)the Natural Science Foundation of Shaanxi Province(2019JQ-722).
文摘Probiotics participate in various physiological activities and contribute to body health.However,their viability and bioefficacy are adversely affected by gastrointestinal harsh conditions,such as gastric acid,bile salts and various enzymes.Fortunately,encapsulation based on various nanomaterials shows tremendous potential to protect probiotics.In this review,we introduced some novel encapsulation technologies involving nanomaterials in view of predesigned stability and viability,selective adhesion,smart release and colonization,and efficacy exertion of encapsulated probiotics.Furthermore,the interactions between encapsulated probiotics and the gastrointestinal tract were summarized and analyzed,with highlighting the regulatory mechanisms of encapsulated probiotics on intestinal mechanical barrier,chemical barrier,biological barrier and immune barrier.This review would benefit the food and pharmaceutical industries in preparation and utilization of multifunctional encapsulated probiotics.
基金Qinglan Project of Jiangsu Province of China,Grant/Award Number:BK20180820National Natural Science Foundation of China,Grant/Award Numbers:12271255,61701243,71771125,72271126,12227808+2 种基金Major Projects of Natural Sciences of University in Jiangsu Province of China,Grant/Award Numbers:21KJA630001,22KJA630001Postgraduate Research and Practice Innovation Program of Jiangsu Province,Grant/Award Number:KYCX23_2343supported by the National Natural Science Foundation of China(no.72271126,12271255,61701243,71771125,12227808)。
文摘As human‐machine interaction(HMI)in healthcare continues to evolve,the issue of trust in HMI in healthcare has been raised and explored.It is critical for the development and safety of healthcare that humans have proper trust in medical machines.Intelligent machines that have applied machine learning(ML)technologies continue to penetrate deeper into the medical environment,which also places higher demands on intelligent healthcare.In order to make machines play a role in HMI in healthcare more effectively and make human‐machine cooperation more harmonious,the authors need to build good humanmachine trust(HMT)in healthcare.This article provides a systematic overview of the prominent research on ML and HMT in healthcare.In addition,this study explores and analyses ML and three important factors that influence HMT in healthcare,and then proposes a HMT model in healthcare.Finally,general trends are summarised and issues to consider addressing in future research on HMT in healthcare are identified.
基金This study was supported by the Inner Mongolia Science and Technology Department Science and Technology Research Project(No.2021GG0270)National Natural Science Foundation of China(81860534)+5 种基金Natural Science Foundation of Inner Mongolia(2021MS08152)Program for Young Talents of Science and Technology in Universities of Inner Mongolia Autonomous Region(NJYT22004)Scientific and Technological Innovative Research Team for Inner Mongolia Medical University of Transformation Application of Organoid in Medical and Industrial Interdiscipline(YKD2022TD002)Major Project of Inner Mongolia Medical University(YKD2022 ZD002)Radiobiology System and Team Construction of Radiotherapy for Inner Mongolia Medical University(YKD2022XK014)Key Laboratoy of Radiation Physics and Biology of Inner Mongolia Medical University(PIKY2023030).
文摘Long non-coding RNAs(lncRNAs)have been implicated in cancer progression and drug resistance development.Moreover,there is evidence that lncRNA HOX transcript antisense intergenic RNA(HOTAIR)is involved in colorectal cancer(CRC)progression.The present study aimed to examine the functional role of lncRNA HOTAIR in conferring radiotherapy resistance in CRC cells,as well as the underlying mechanism.The relative expression levels of HOTAIR were examined in 70 pairs of CRC tumor and para-cancerous tissues,as well as in radiosensitive and radioresistant samples.The correlations between HOTAIR expression levels and clinical features of patients with CRC were assessed using the Chi-square test.Functional assays such as cell proliferation,colony formation and apoptosis assays were conducted to determine the radiosensitivity in CRC cells with HOTAIR silencing after treatment with different doses of radiation.RNA pull-down assay andfluorescence in situ hybridization(FISH)were used to determine the interaction between HOTAIR and DNA damage response mediator ataxia-telangiectasia mutated-and Rad3-related(ATR).HOTAIR was significantly upregulated in CRC tumor tissues,especially in radioresistant tumor samples.The elevated expression of HOTAIR was correlated with more advanced histological grades,distance metastasis and the poor prognosis in patients with CRC.Silencing HOTAIR suppressed the proliferation and promoted apoptosis and radiosensitivity in CRC cells.HOTAIR knockdown also inhibited the tumorigenesis of CRC cells and enhanced the sensitivity to radiotherapy in a mouse xenograft model.Moreover,the data showed that HOTAIR could interact with ATR to regulate the DNA damage repair signaling pathway.Silencing HOTAIR impaired the ATR-ATR interacting protein(ATRIP)complex and signaling in cell cycle progression.Collectively,the present results indicate that lncRNA HOTAIR facilitates the DNA damage response pathway and promotes radioresistance in CRC cells by targeting ATR.
文摘Repairs of corroded high-pressure pipelines are essential for fluids transportation under high pressure.One of the methods used in their repairs is the use of layered composites.The composite used must have the necessary strength.Therefore,the experiments and analytical solutions presented in this paper are performed according to the relevant standards and codes,including ASME PCC-2,ASME B31.8S,ASME B31.4,ISO 24817 and ASME B31.G.In addition,the experimental tests are replicated numerically using the finite element method.Setting the strain gauges at different distances from the defect location,can reduce the nonlinear effects,deformation,and fluctuations due to the high pressure.The direct relationship between the depth of an axial defect and the stress concentration is observed at the inner side edges of the defect.Composite reparation reduces the non-linearities related to the sharp variation of the geometry and a more reliable numerical simulation could be performed.
基金This work was supported by the Ministry of Education and China Mobile Research Fund Project(MCM20200102)the 173 Project(No.2019-JCJQ-ZD-342-00)+2 种基金the National Natural Science Foundation of China(No.U19A2081)the Fundamental Research Funds for the Central Universities(No.2023SCU12129)the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129).
文摘Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss.
基金Research and Development Program of China(2023YFD1400200)the Natural Science Foundation of Fujian Province,China(2022J01125)+2 种基金the Fujian Key Laboratory for Monitoring and Integrated Management of Crop Pests,China(MIMCP-202301)the Fujian Provincial Science and Technology Key Project,China(2022NZ030014)the National Natural Science Foundation of China(NSFC31871914).
文摘The conserved DNA damage repair complex,MMS21-SMC5/6(Methyl methane sulfonate 21-Structural maintenance of chromosomes 5/6),has been extensively studied in yeast,animals,and plants.However,its role in phytopathogenic fungi,particularly in the highly destructive rice blast fungus Magnaporthe oryzae,remains unknown.In this study,we functionally characterized the homologues of this complex,MoMMS21 and MoSMC5,in M.oryzae.We first demonstrated the importance of DNA damage repair in M.oryzae by showing that the DNA damage inducer phleomycin inhibited vegetative growth,infection-related development and pathogenicity in this fungus.Additionally,we discovered that MoMMS21 and MoSMC5 interacted in the nuclei,suggesting that they also function as a complex in M.oryzae.Gene deletion experiments revealed that both MoMMS21 and MoSMC5 are required for infection-related development and pathogenicity in M.oryzae,while only MoMMS21 deletion affected growth and sensitivity to phleomycin,indicating its specific involvement in DNA damage repair.Overall,our results provide insights into the roles of MoMMS21 and MoSMC5 in M.oryzae,highlighting their functions beyond DNA damage repair.
基金financially supported by the Science and Technology Commission Foundation of Shanghai(Grant Nos.22DZ1208903,20DZ2251900)the National Natural Science Foundation of China(Grant No.51679134)。
文摘A new scour countermeasure using solidified slurry for offshore foundation has been proposed recently.Fluidized solidified slurry is pumped to seabed area around foundation for scour protection or pumped into the developed scour holes for scour repair as the fluidized material solidifies gradually.In the pumping operation and solidification,the engineering behaviors of solidified slurry require to be considered synthetically for the reliable application in scour repair and protection of ocean engineering such as the pumpability related flow value,flow diffusion behavior related rheological property,anti-scour performance related retention rate in solidification and bearing capacity related strength property after solidification.In this study,a series of laboratory tests are conducted to investigate the effects of mix proportion(initial water content and binder content)on the flow value,rheological properties,density,retention rate of solidified slurry and unconfined compressive strength(UCS).The results reveal that the flow value increases with the water content and decreases with the binder amount.All the solidified slurry exhibits Bingham plastic behavior when the shear rate is larger than 5 s^(-1).The Bingham model has been employed to fit the rheology test results,and empirical formulas for obtaining the density,yield stress and viscosity are established,providing scientific support for the numerical assessment of flow and diffusion of solidified slurry.Retention rate of solidified slurry decreases with the water flow velocity and flow value,which means the pumpability of solidified slurry is contrary to anti-scour performance.The unconfined compressive strength after solidification reduces as the water content increases and binder content decreases.A design and application procedure of solidified soil for scour repair and protection is also proposed for engineering reference.