期刊文献+
共找到196,065篇文章
< 1 2 250 >
每页显示 20 50 100
A new quantum key distribution resource allocation and routing optimization scheme
1
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
Loss of SHROOM3 affects neuroepithelial cell shape through regulating cytoskeleton proteins in cynomolgus monkey organoids 被引量:1
2
作者 Peng Li Ting Zhang +7 位作者 Ruo Wu Jun-Yu Zhang Yan Zhuo Shan-Gang Li Jiao-Jian Wang Wen-Ting Guo Zheng-Bo Wang Yong-Chang Chen 《Zoological Research》 SCIE CSCD 2024年第2期233-241,共9页
Neural tube defects(NTDs)are severe congenital neurodevelopmental disorders arising from incomplete neural tube closure.Although folate supplementation has been shown to mitigate the incidence of NTDs,some cases,often... Neural tube defects(NTDs)are severe congenital neurodevelopmental disorders arising from incomplete neural tube closure.Although folate supplementation has been shown to mitigate the incidence of NTDs,some cases,often attributable to genetic factors,remain unpreventable.The SHROOM3 gene has been implicated in NTD cases that are unresponsive to folate supplementation;at present,however,the underlying mechanism remains unclear.Neural tube morphogenesis is a complex process involving the folding of the planar epithelium of the neural plate.To determine the role of SHROOM3 in early developmental morphogenesis,we established a neuroepithelial organoid culture system derived from cynomolgus monkeys to closely mimic the in vivo neural plate phase.Loss of SHROOM3 resulted in shorter neuroepithelial cells and smaller nuclei.These morphological changes were attributed to the insufficient recruitment of cytoskeletal proteins,namely fibrous actin(F-actin),myosin II,and phospho-myosin light chain(PMLC),to the apical side of the neuroepithelial cells.Notably,these defects were not rescued by folate supplementation.RNA sequencing revealed that differentially expressed genes were enriched in biological processes associated with cellular and organ morphogenesis.In summary,we established an authentic in vitro system to study NTDs and identified a novel mechanism for NTDs that are unresponsive to folate supplementation. 展开更多
关键词 Neural tube defects SHROOM3 NEUROEPITHELIAL ORGANOIDS Cynomolgus monkey
下载PDF
Elucidation of potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa
3
作者 Mingming Li Qiujin Zhu +4 位作者 Chao Qu Xiaohui Gong Yunhan Zhang Xin Zhang Shouwei Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期2152-2160,共9页
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T... Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal. 展开更多
关键词 Dry-cured pork coppa Endogenous proteases PROTEOLYSIS Key taste-active amino acids Volatile compounds
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
4
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
5
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security
下载PDF
The 2023 Turkey earthquake doublet: Earthquake relocation, seismic tomography, and stress field inversion
6
作者 HuiLi Zhan Ling Bai +3 位作者 Bagus Adi Wibowo ChaoYa Liu Kazuo Oike Yuzo Ishikawa 《Earth and Planetary Physics》 EI CAS CSCD 2024年第3期535-548,共14页
On February 6,2023,two earthquakes with magnitudes of M_(W) 7.8 and M_(W) 7.5 struck southeastern Turkey,causing significant casualties and economic losses.These seismic events occurred along the East Anatolian Fault ... On February 6,2023,two earthquakes with magnitudes of M_(W) 7.8 and M_(W) 7.5 struck southeastern Turkey,causing significant casualties and economic losses.These seismic events occurred along the East Anatolian Fault Zone,a convergent boundary between the Arabian Plate and the Anatolian Subplate.In this study,we analyze the M_(W) 7.8 and M_(W) 7.5 earthquakes by comparing their aftershock relocations,tomographic images,and stress field inversions.The earthquakes were localized in the upper crust and exhibited steep dip angles.Furthermore,the aftershocks occurred either close to the boundaries of low and high P-wave velocity anomaly zones or within the low P-wave velocity anomaly zones.The East Anatolia Fault,associated with the M_(W) 7.8 earthquake,and the SürgüFault,related to the M_(W) 7.5 earthquake,predominantly experienced shear stress.However,their western sections experienced a combination of strike-slip and tensile stresses in addition to shear stress.The ruptures of the M_(W) 7.8 and M_(W) 7.5 earthquakes appear to have bridged a seismic gap that had seen sparse seismicity over the past 200 years prior to the 2023 Turkey earthquake sequence. 展开更多
关键词 Turkey earthquake doublet earthquake relocation seismic tomography stress field SEISMICITY
下载PDF
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
7
作者 Bin Wu Xianyi Chen +5 位作者 Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei 《Computers, Materials & Continua》 SCIE EI 2024年第3期3177-3194,共18页
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on... In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so on.Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers.Servers on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure state.The issue of privacy data protection has become an important obstacle to data sharing and usage.How to query outsourcing graph data safely and effectively has become the focus of research.Adjacency query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same time.This work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a solution.In our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud server.Our proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental analysis.The research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology. 展开更多
关键词 PRIVACY-PRESERVING adjacency query multi-keyword fuzzy search encrypted graph
下载PDF
Generation of mitochondrial replacement monkeys by female pronucleus transfer 被引量:1
8
作者 Chun-Yang Li Xing-Chen Liu +6 位作者 Yu-Zhuo Li Yan Wang Yan-Hong Nie Yu-Ting Xu Xiao-Tong Zhang Yong Lu Qiang Sun 《Zoological Research》 SCIE CSCD 2024年第2期292-298,共7页
Mutations in mitochondrial DNA(mtDNA)are maternally inherited and have the potential to cause severe disorders.Mitochondrial replacement therapies,including spindle,polar body,and pronuclear transfers,are promising st... Mutations in mitochondrial DNA(mtDNA)are maternally inherited and have the potential to cause severe disorders.Mitochondrial replacement therapies,including spindle,polar body,and pronuclear transfers,are promising strategies for preventing the hereditary transmission of mtDNA diseases.While pronuclear transfer has been used to generate mitochondrial replacement mouse models and human embryos,its application in non-human primates has not been previously reported.In this study,we successfully generated four healthy cynomolgus monkeys(Macaca fascicularis)via female pronuclear transfer.These individuals all survived for more than two years and exhibited minimal mtDNA carryover(3.8%–6.7%),as well as relatively stable mtDNA heteroplasmy dynamics during development.The successful establishment of this nonhuman primate model highlights the considerable potential of pronuclear transfer in reducing the risk of inherited mtDNA diseases and provides a valuable preclinical research model for advancing mitochondrial replacement therapies in humans. 展开更多
关键词 Non-human primates Mitochondrial replacement Female pronuclear transfer
下载PDF
Identification of key genes regulating the synthesis of quercetin derivatives in Rosa roxburghii through integrated transcriptomics and metabolomics
9
作者 Liyao Su Min Wu +2 位作者 Tian Zhang Yan Zhong Zongming(Max) Cheng 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第3期876-887,共12页
Rosa roxburghii fruit is rich in flavonoids, but little is known about their biosynthetic pathways. In this study, we employed transcriptomics and metabolomics to study changes related to the flavonoids at five differ... Rosa roxburghii fruit is rich in flavonoids, but little is known about their biosynthetic pathways. In this study, we employed transcriptomics and metabolomics to study changes related to the flavonoids at five different stages of R. roxburghii fruit development. Flavonoids and the genes related to their biosynthesis were found to undergo significant changes in abundance across different developmental stages, and numerous quercetin derivatives were identified. We found three gene expression modules that were significantly associated with the abundances of the different flavonoids in R. roxburghii and identified three structural UDP-glycosyltransferase genes directly involved in the synthesis of quercetin derivatives within these modules. In addition, we found that RrBEH4, RrLBD1 and RrPIF8could significantly increase the expression of downstream quercetin derivative biosynthesis genes. Taken together,these results provide new insights into the metabolism of flavonoids and the accumulation of quercetin derivatives in R. roxburghii. 展开更多
关键词 Rosa roxburghii quercetin derivatives weighted gene co-expression network analysis transcription factor transcriptome METABOLOME
下载PDF
Comparative transcriptome analysis reveals key genes and pathways in response to Alternaria alternata apple pathotype infection
10
作者 Kai Liu Zhaolin Liang +4 位作者 An Yang Jiadi Yan Peihua Cong Xiaolei Han Caixia Zhang 《Horticultural Plant Journal》 SCIE CAS CSCD 2024年第3期641-656,共16页
Apple leaf spot,caused by the Alternaria alternata apple pathotype(AAAP),is an important fungal disease of apple.To understand the molecular basis of resistance and pathogenesis in apple leaf spot,the transcriptomes o... Apple leaf spot,caused by the Alternaria alternata apple pathotype(AAAP),is an important fungal disease of apple.To understand the molecular basis of resistance and pathogenesis in apple leaf spot,the transcriptomes of two apple cultivars‘Hanfu'(HF)(resistant)and‘Golden Delicious'(GD)(susceptible)were analyzed at 0,6,18,24 and 48 h after AAAP inoculation by RNA-Seq.At each time point,a large number of significantly differentially expressed genes(DEGs)were screened between AAAP-inoculated and uninoculated apple leaves.Analysis of the common DEGs at four time points revealed significant differences in the resistance of‘HF'and‘GD'apple to AAAP infection.RLP,RNL,and JA signal-related genes were upregulated in both cultivars to restrict AAAP development.However,genes encoding CNLs,TNLs,WRKYs,and AP2s were only activated in‘HF'as part of the resistance response,of which,some play major roles in the regulation of ET and SA signal transduction.Further analysis showed that many DEGs with opposite expression trends in the two hosts may play important regulatory roles in response to AAAP infection.Transient expression of one such gene MdERF110 in‘GD'apple leaves improved AAAP resistance.Collectively,this study highlights the reasons for differential resistance to AAAP infection between‘HF'and‘GD'apples which can theoretically assist the molecular breeding of disease-resistant apple crops. 展开更多
关键词 APPLE TRANSCRIPTOME Alternaria alternata apple pathotype Infection Defense response
下载PDF
Predicting impact forces on pipelines from deep-sea fluidized slides:A comprehensive review of key factors
11
作者 Xingsen Guo Ning Fan +5 位作者 Defeng Zheng Cuiwei Fu Hao Wu Yanjun Zhang Xiaolong Song Tingkai Nian 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2024年第2期211-225,共15页
Deep-sea pipelines play a pivotal role in seabed mineral resource development,global energy and resource supply provision,network communication,and environmental protection.However,the placement of these pipelines on ... Deep-sea pipelines play a pivotal role in seabed mineral resource development,global energy and resource supply provision,network communication,and environmental protection.However,the placement of these pipelines on the seabed surface exposes them to potential risks arising from the complex deep-sea hydrodynamic and geological environment,particularly submarine slides.Historical incidents have highlighted the substantial damage to pipelines due to slides.Specifically,deep-sea fluidized slides(in a debris/mud flow or turbidity current physical state),characterized by high speed,pose a significant threat.Accurately assessing the impact forces exerted on pipelines by fluidized submarine slides is crucial for ensuring pipeline safety.This study aimed to provide a comprehensive overview of recent advancements in understanding pipeline impact forces caused by fluidized deep-sea slides,thereby identifying key factors and corresponding mechanisms that influence pipeline impact forces.These factors include the velocity,density,and shear behavior of deep-sea fluidized slides,as well as the geometry,stiffness,self-weight,and mechanical model of pipelines.Additionally,the interface contact conditions and spatial relations were examined within the context of deep-sea slides and their interactions with pipelines.Building upon a thorough review of these achievements,future directions were proposed for assessing and characterizing the key factors affecting slide impact loading on pipelines.A comprehensive understanding of these results is essential for the sustainable development of deep-sea pipeline projects associated with seabed resource development and the implementation of disaster prevention measures. 展开更多
关键词 Deep-sea fluidized slides Pipes Impact forces Shear behavior of slides Interface contact conditions Spatial relation
下载PDF
Joint Authentication Public Network Cryptographic Key Distribution Protocol Based on Single Exposure Compressive Ghost Imaging
12
作者 俞文凯 王硕飞 商克谦 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第2期47-56,共10页
In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memo... In the existing ghost-imaging-based cryptographic key distribution(GCKD)protocols,the cryptographic keys need to be encoded by using many modulated patterns,which undoubtedly incurs long measurement time and huge memory consumption.Given this,based on snapshot compressive ghost imaging,a public network cryptographic key distribution protocol is proposed,where the cryptographic keys and joint authentication information are encrypted into several color block diagrams to guarantee security.It transforms the previous single-pixel sequential multiple measurements into multi-pixel single exposure measurements,significantly reducing sampling time and memory storage.Both simulation and experimental results demonstrate the feasibility of this protocol and its ability to detect illegal attacks.Therefore,it takes GCKD a big step closer to practical applications. 展开更多
关键词 GHOST GHOST AUTHENTICATION
下载PDF
Audio-visual keyword transformer for unconstrained sentence-level keyword spotting
13
作者 Yidi Li Jiale Ren +3 位作者 Yawei Wang Guoquan Wang Xia Li Hong Liu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期142-152,共11页
As one of the most effective methods to improve the accuracy and robustness of speech tasks,the audio-visual fusion approach has recently been introduced into the field of Keyword Spotting(KWS).However,existing audio-... As one of the most effective methods to improve the accuracy and robustness of speech tasks,the audio-visual fusion approach has recently been introduced into the field of Keyword Spotting(KWS).However,existing audio-visual keyword spotting models are limited to detecting isolated words,while keyword spotting for unconstrained speech is still a challenging problem.To this end,an Audio-Visual Keyword Transformer(AVKT)network is proposed to spot keywords in unconstrained video clips.The authors present a transformer classifier with learnable CLS tokens to extract distinctive keyword features from the variable-length audio and visual inputs.The outputs of audio and visual branches are combined in a decision fusion module.As humans can easily notice whether a keyword appears in a sentence or not,our AVKT network can detect whether a video clip with a spoken sentence contains a pre-specified keyword.Moreover,the position of the keyword is localised in the attention map without additional position labels.Exper-imental results on the LRS2-KWS dataset and our newly collected PKU-KWS dataset show that the accuracy of AVKT exceeded 99%in clean scenes and 85%in extremely noisy conditions.The code is available at https://github.com/jialeren/AVKT. 展开更多
关键词 artificial intelligence multimodal approaches natural language processing neural network speech processing
下载PDF
The miR-9-5p/CXCL11 pathway is a key target of hydrogen sulfide-mediated inhibition of neuroinflammation in hypoxic ischemic brain injury 被引量:1
14
作者 Yijing Zhao Tong Li +6 位作者 Zige Jiang Chengcheng Gai Shuwen Yu Danqing Xin Tingting Li Dexiang Liu Zhen Wang 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第5期1084-1091,共8页
We previously showed that hydrogen sulfide(H2S)has a neuroprotective effect in the context of hypoxic ischemic brain injury in neonatal mice.However,the precise mechanism underlying the role of H2S in this situation r... We previously showed that hydrogen sulfide(H2S)has a neuroprotective effect in the context of hypoxic ischemic brain injury in neonatal mice.However,the precise mechanism underlying the role of H2S in this situation remains unclear.In this study,we used a neonatal mouse model of hypoxic ischemic brain injury and a lipopolysaccharide-stimulated BV2 cell model and found that treatment with L-cysteine,a H2S precursor,attenuated the cerebral infarction and cerebral atrophy induced by hypoxia and ischemia and increased the expression of miR-9-5p and cystathionineβsynthase(a major H2S synthetase in the brain)in the prefrontal cortex.We also found that an miR-9-5p inhibitor blocked the expression of cystathionineβsynthase in the prefrontal cortex in mice with brain injury caused by hypoxia and ischemia.Furthermore,miR-9-5p overexpression increased cystathionine-β-synthase and H2S expression in the injured prefrontal cortex of mice with hypoxic ischemic brain injury.L-cysteine decreased the expression of CXCL11,an miR-9-5p target gene,in the prefrontal cortex of the mouse model and in lipopolysaccharide-stimulated BV-2 cells and increased the levels of proinflammatory cytokines BNIP3,FSTL1,SOCS2 and SOCS5,while treatment with an miR-9-5p inhibitor reversed these changes.These findings suggest that H2S can reduce neuroinflammation in a neonatal mouse model of hypoxic ischemic brain injury through regulating the miR-9-5p/CXCL11 axis and restoringβ-synthase expression,thereby playing a role in reducing neuroinflammation in hypoxic ischemic brain injury. 展开更多
关键词 chemokine(C-X-C motif)ligand 11 cystathionineβsynthase H2S hypoxic ischemic brain injury inflammation L-CYSTEINE lipopolysaccharide microglia miR-9-5p neuroprotection
下载PDF
Dynamic foraging strategy adaptation to heterogeneous environments contributes to social aggregation in snub-nosed monkeys
15
作者 Lan Zhao Sheng-Nan Ji +7 位作者 Xiao-Bing Du Jia-Hui Liu Bo-Lun Zhang Pei-Hua Li Yi-Jun Yang Bao-Guo Li Yan-Qing Guo Xiao-Guang Qi 《Zoological Research》 SCIE CSCD 2024年第1期39-54,共16页
The dynamics of animal social structures are heavily influenced by environmental patterns of competition and cooperation.In folivorous colobine primates,prevailing theories suggest that larger group sizes should be fa... The dynamics of animal social structures are heavily influenced by environmental patterns of competition and cooperation.In folivorous colobine primates,prevailing theories suggest that larger group sizes should be favored in rainforests with a year-round abundance of food,thereby reducing feeding competition.Yet,paradoxically,larger groups are frequently found in high-altitude or high-latitude montane ecosystems characterized by a seasonal scarcity of leaves.This contradiction is posited to arise from cooperative benefits in heterogeneous environments.To investigate this hypothesis,we carried out a six-year field study on two neighboring groups of golden snub-nosed monkey(Rhinopithecus roxellana),a species representing the northernmost distribution of colobine primates.Results showed that the groups adjusted their movement and habitat selection in response to fluctuating climates and spatiotemporal variability of resources,indicative of a dynamic foraging strategy.Notably,during the cold,resource-scarce conditions in winter,the large group occupied food-rich habitats but did not exhibit significantly longer daily travel distances than the smaller neighboring group.Subsequently,we compiled an eco-behavioral dataset of 52 colobine species to explore their evolutionary trajectories.Analysis of this dataset suggested that the increase in group size may have evolved via home range expansion in response to the cold and heterogeneous climates found at higher altitudes or latitudes.Hence,we developed a multi-benefits framework to interpret the formation of larger groups by integrating environmental heterogeneity.In cold and diverse environments,even smaller groups require larger home ranges to meet their dynamic survival needs.The spatiotemporal distribution of high-quality resources within these expanded home ranges facilitates more frequent interactions between groups,thereby encouraging social aggregation into larger groups.This process enhances the benefits of collaborative actions and reproductive opportunities,while simultaneously optimizing travel costs through a dynamic foraging strategy. 展开更多
关键词 Social evolution Folivore paradox MLS Rhinopithecus roxellana Multi-benefits framework
下载PDF
Immunological disturbance effect of exogenous histamine towards key immune cells
16
作者 Yanan Liu Huan Li +5 位作者 Chong Wang Shanjun Chen Renjie Lian Weiqiang Wang Linglin Fu Yanbo Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期1856-1863,共8页
Histamine in food has attracted widespread attention due to the potential toxicity and associated health risk.However,its influences on immunological components,especially the function of key immune cells,are still po... Histamine in food has attracted widespread attention due to the potential toxicity and associated health risk.However,its influences on immunological components,especially the function of key immune cells,are still poorly known.In this work,we explored the effects of exogenous histamine on the function of key immune cells such as intestinal epithelial cells,dendritic cells,and T cells.The results showed that histamine could affect the expression of allergy-related genes in CMT93 cells at a high dose of histamine.Moreover,it’s found that histamine could cause an imbalance in the levels of relevant immune factors secreted by dendritic cells and T cells,especially those related to allergy.At the same time,the proportion of MHC class IIpositive dendritic cells and the proportion of T helper 2(Th2)cells in CD4^(+)T cells increased after histamine stimulation.We concluded that the presence of a certain level of histamine in food may affect the expression of allergy-related cytokines,disrupt the balance of the immune homeostasis,and potentially lead to adverse immune reactions.This work demonstrated the importance of including the estimation of histamine’s immune safety in aquatic products rather than merely considering the potential risk of food poisoning. 展开更多
关键词 HISTAMINE Immunological disturbance Food allergy Immune factor Edible safety
下载PDF
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
17
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
下载PDF
Transcriptome-based analysis of key signaling pathways affecting the formation of primordial germ cell in chickens
18
作者 Ying Ding Qiong Zhi +3 位作者 Qisheng Zuo Kai Jin Wei Han Bichun Li 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第5期1644-1657,共14页
Bone morphogenetic protein 4(BMP4)can induce the formation of chicken primordial germ cells(PGCs)in vitro;however,its regulatory mechanism in poultry remains unknown.This study aimed to use RNA-seq to analyze PGCs in ... Bone morphogenetic protein 4(BMP4)can induce the formation of chicken primordial germ cells(PGCs)in vitro;however,its regulatory mechanism in poultry remains unknown.This study aimed to use RNA-seq to analyze PGCs in chicken embryos and iPGCs induced by BMP4 in vitro,clarify the internal regulatory factors of PGCs,analyze the mechanism of the formation of PGCs,and lay a theoretical foundation for the further optimization of PGCs induction systems.Embryonic stem cells(ESCs),PGCs and iPGCs induced by BMP4 in vitro were collected.The transcriptional maps of the three cell types were studied using RNA-seq.The results showed 6,142 genes differentially expressed between PGCs and iPGCs,of which 2,728 were upregulated in iPGCs and 3,414 were downregulated in iPGCs.Compared to that in ESCs,BMP4 was significantly upregulated in PGCs and iPGCs.KEGG results showed that both the TGF-βand Wnt signaling pathways were activated during the formation of PGCs in vitro and in vivo,and the activation was more significant during iPGCs induced by BMP4.The expression of Nodal,an inhibitory factor of TGF-βsignaling,was significantly decreased in PGCs and iPGCs,but was not expressed in iPGCs,which further supports our conclusion.Additionally,the Lysosome and PI3K-AKT signaling pathways were significantly enriched in PGCs and iPGCs,respectively.Further,transmission electron microscopy(TEM)results showed that the number of autolysosomes was significantly higher after the addition of BMP4,which is consistent with the KEGG results.Furthermore,the number of PGCs was significantly reduced after ATG14 was interfered in vivo and in vitro.In conclusion,this study screened out the key signaling pathways during the formation of PGCs,aiming to provide help for enriching the mechanism network regulating PGCs formation in chicken and laying a theoretical foundation for further improving the efficiency of inducing PGCs in vitro. 展开更多
关键词 RNA-seq BMP4 PGCS ATG14 CHICKEN
下载PDF
Central Asia revealed as a key area in evolution of Eremurus (Asphodelaceae)
19
作者 Dilmurod Makhmudjanov Sergei Volis +4 位作者 Ziyoviddin Yusupov Inom Juramurodov Komiljon Tojibaev Tao Deng Hang Sun 《Plant Diversity》 SCIE CAS CSCD 2024年第3期333-343,共11页
Eremurus was described at the beginning of the 19th century.However,due to limited sampling and the small number of gene markers to date,its phylogeny and evolution are largely unknown.In this study,we analyzed plasto... Eremurus was described at the beginning of the 19th century.However,due to limited sampling and the small number of gene markers to date,its phylogeny and evolution are largely unknown.In this study,we analyzed plastomes from 27 species belonging to 2 subgenera and 3 sections of Eremurus,which are found in Central Asia(its center of diversity)and China.We also analyzed nuclear DNA ITS of 33 species,encompassing all subgenera and sections of the genus in Central Asia,southwest Asia and China.Our findings revealed that the genus was monophyletic,although both subgenera Eremurus and Henningia were found to be paraphyletic.Both plastome and nrDNA-based phylogenetic trees had three clades that did not reflect the current taxonomy of the genus.Our biogeographical and time-calibrated trees suggest that Eremurus originated in the ancient Tethyan area in the second half of the Eocene.Diversification of Eremurus occurred from the early Oligocene to the late Miocene.Paratethys Sea retreat and several orogenetic events,such as the progressive uplift of the Qinghai-Tibet Plateau and surrounding mountain belts(Altai,Pamir,Tian Shan),caused serious topographic and climate(aridification)changes in Central Asia that may have triggered a split of clades and speciation.In this transformed Central Asia,speciation proceeded rapidly driven mainly by vicariance caused by numerous mountain chains and specialization to a variety of climatic,topographic and soil conditions that exist in this region. 展开更多
关键词 ASPHODELACEAE Asphodeloideae PLASTOME Central Asia Qinghai-Tibet Plateau
下载PDF
Key technologies for wireless network digital twin towards smart railways
20
作者 Ke Guan Xinghai Guo +6 位作者 Danping He Philipp Svoboda Marion Berbineau Stephen Wang Bo Ai Zhangdui Zhong Markus Rupp 《High-Speed Railway》 2024年第1期1-10,共10页
An emerging railway technology called smart railway promises to deliver higher transportation efficiency,enhanced comfort in services,and greater eco-friendliness.The smart railway is expected to integrate fifth-gener... An emerging railway technology called smart railway promises to deliver higher transportation efficiency,enhanced comfort in services,and greater eco-friendliness.The smart railway is expected to integrate fifth-generation mobile communication(5G),Artificial Intelligence(AI),and other technologies,which poses new problems in the construction,operation and maintenance of railway wireless networks.Wireless Digital Twins(DTs),which have recently emerged as a new paradigm for the design of wireless networks,can address these problems and enable the whole lifecycle management of railway wireless networks.However,there are still many scientific issues and challenges for railway-oriented wireless DT.Relevant key technologies to solve these problems are introduced and described,including characterization of materials'physical-EM properties,autonomous reconstruction of Three-dimensional(3D)environment model,AI-empowered environmental cognition,Ray-Tracing(RT),model-based and AIbased RT acceleration,and generation of multi-spectra sensing data.Moreover,this paper presents our research results for each key technology and describes the wireless network planning and optimization system based on highperformance RT developed by our laboratory.This paper outlines the framework for realizing the wireless DT of smart railways,providing the direction for future research. 展开更多
关键词 Digital twin Smart railways Ray tracing Channel characterization
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部