Contactless manipulation of multi-scale objects using the acoustic vortex(AV) tweezers offers tremendous perspectives in biomedical applications.However,it is still hindered by the weak acoustic radiation force(ARF) a...Contactless manipulation of multi-scale objects using the acoustic vortex(AV) tweezers offers tremendous perspectives in biomedical applications.However,it is still hindered by the weak acoustic radiation force(ARF) and torque(ART)around the vortex center.By introducing the elevation angle to the planar transducers of an N-element ring array,the weakfocused acoustic vortex(WFAV) composed of a main-AV and N paraxial-AVs is constructed to conduct a large-scale object manipulation.Different from the traditional focused AV(FAV) generated by a ring array of concave spherical transducers,a much larger focal region of the WFAV is generated by the main lobes of the planar transducers with the size inversely associated with the elevation angle.With the pressure simulation of the acoustic field,the capability of the rotational object driving in the focal plane for the WFAV is analyzed using the ARF and the ART exerted on an elastic ball based on acoustic scattering.With the experimental system built in water,the generation of the WFAV is verified by the scanning measurements of the acoustic field and the capability of object manipulation is also analyzed by the rotational trapping of floating particles in the focal plane.The favorable results demonstrate the feasibility of large-scale rotational manipulation of objects with a strengthened ART and a reduced acousto-thermal damage to biological tissues,showing a promising prospect for potential applications in clinical practice.展开更多
BACKGROUND Hepatocellular carcinoma(HCC)is a major health challenge with high incidence and poor survival rates in China.Systemic therapies,particularly tyrosine kinase inhibitors(TKIs),are the first-line treatment fo...BACKGROUND Hepatocellular carcinoma(HCC)is a major health challenge with high incidence and poor survival rates in China.Systemic therapies,particularly tyrosine kinase inhibitors(TKIs),are the first-line treatment for advanced HCC,but resistance is common.The Rho GTPase family member Rho GTPase activating protein 12(ARHGAP12),which regulates cell adhesion and invasion,is a potential therapeutic target for overcoming TKI resistance in HCC.However,no studies on the expression of ARHGAP12 in HCC and its role in resistance to TKIs have been reported.AIM To unveil the expression of ARHGAP12 in HCC,its role in TKI resistance and its potential associated pathways.METHODS This study used single-cell RNA sequencing(scRNA-seq)to evaluate ARHGAP12 mRNA levels and explored its mechanisms through enrichment analysis.CellChat was used to investigate focal adhesion(FA)pathway regulation.We integrated bulk RNA data(RNA-seq and microarray),immunohistochemistry and proteomics to analyze ARHGAP12 mRNA and protein levels,correlating with clinical outcomes.We assessed ARHGAP12 expression in TKI-resistant HCC,integrated conventional HCC to explore its mechanism,identified intersecting FA pathway genes with scRNA-seq data and evaluated its response to TKI and immunotherapy.RESULTS ARHGAP12 mRNA was found to be highly expressed in malignant hepatocytes and to regulate FA.In malignant hepatocytes in high-score FA groups,MDK-[integrin alpha 6(ITGA6)+integrinβ-1(ITGB1)]showed specificity in ligand-receptor interactions.ARHGAP12 mRNA and protein were upregulated in bulk RNA,immunohistochemistry and proteomics,and higher expression was associated with a worse prognosis.ARHGAP12 was also found to be a TKI resistance gene that regulated the FA pathway.ITGB1 was identified as a crossover gene in the FA pathway in both scRNA-seq and bulk RNA.High expression of ARHGAP12 was associated with adverse reactions to sorafenib,cabozantinib and regorafenib,but not to immunotherapy.CONCLUSION ARHGAP12 expression is elevated in HCC and TKI-resistant HCC,and its regulatory role in FA may underlie the TKI-resistant phenotype.展开更多
This paper studies the weighted average consensus problem for networks of agents with fixed directed asymmetric unbalance information exchange topology. We suppose that the classical distributed consensus protocol is ...This paper studies the weighted average consensus problem for networks of agents with fixed directed asymmetric unbalance information exchange topology. We suppose that the classical distributed consensus protocol is destroyed by diverse time-delays which include communication time-delay and self time-delay. Based on the generalized Nyquist stability criterion and the Gerschgorin disk theorem, some sufficient conditions for the consensus of multi-agent systems are obtained. And we give the expression of the weighted average consensus value for our consensus protocol. Finally, numerical examples are presented to illustrate the theoretical results.展开更多
An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the...An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the relay-destination(R-D) link. A special XOR vector is defined using the correlated hard decision information blocks from two decoders and the extrinsic information exchanged between the two decoders is derived by the log-likelihood ratio(LLR) associated with the XOR vector. Such the decoding scheme is different from the traditional turbo-like detection/decoding algorithm, where the extrinsic information is computed by the side information and the soft decoder outputs. Simulations show that the presented algorithm has a slightly better performance than the traditional turbo-like algorithm(Taking the(255,175) EG-LDPC code as an example, it achieves about 0.1 dB performance gains aroundBLER=10^(-4)). Furthermore, the presented algorithm requires fewer computing operations per iteration and has faster convergence rate. For example, the average iteration of the presented algorithm is 33 at SNR=1.8 dB, which is about twice faster than that of the turbo-like algorithm, when decoding the(961,721) QC-LDPC code. Therefore, the presented decoding algorithm of correlated sources provides an alternative decoding solution for the LDPC-based relay systems.展开更多
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse...Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme.展开更多
Given the enhanced channel capacity of wave chirality,acoustic communications based on the orbital angular momentum(OAM)of acoustic-vortex(AV)beams are of significant interest for underwater data transmissions.However...Given the enhanced channel capacity of wave chirality,acoustic communications based on the orbital angular momentum(OAM)of acoustic-vortex(AV)beams are of significant interest for underwater data transmissions.However,the stringent beam alignment is required for the coaxial arrangement of transceiver arrays to ensure the accuracy and reliability of OAM decoding.To avoid the required multiple measurements of the traditional orthogonality based algorithm,the beam alignment algorithm based on the OAM spectrum decomposition is proposed for AV communications by using simplified ring-arrays.Numerical studies of the single-OAM and OAM-multiplexed AV beams show that the error of the OAM spectrum increases with the translation distance and the deflection angle of the transceiver arrays.To achieve an ideal arrangement,two methods of the single-array translation alignment and the dual-array deflection alignment are developed based on the least standard deviation of the OAM spectrum(SD-OAM).By decreasing the SD-OAM towards zero using transceiver arrays of 16 transmitters and 16 receivers,accurate beam alignments are accomplished by multiple adjustments in three dimensions.The proposed method is also demonstrated by experimental measurements of the OAM dispersion and the SD-OAM for misaligned beams.The results demonstrate the feasibility of the rapid beam alignment based on the OAM spectrum decomposition by using simplified transceiver ring-arrays,and suggest more application potentials for acoustic communications.展开更多
A new diagnosis method, called Double-Syndrome diagnostic, is proposed, which can identify faulty nodes by comparing 2 different syndromes. For the same system, the average number of faulty nodes identified correctly ...A new diagnosis method, called Double-Syndrome diagnostic, is proposed, which can identify faulty nodes by comparing 2 different syndromes. For the same system, the average number of faulty nodes identified correctly by the Double-Syndrome diagnostic is much greater than the t-diagnosability and the(t_1/t_1)-diagnosability of the system. Furthermore, in order to identify the remaining faulty nodes in the system, two strategies of fault diagnostic are proposed, one is called(k, t)-fault diagnosable strategy, another is called(k, t/t)-fault diagnosable strategy. Besides, the conditional(k, t)-diagnosable((k, t/t)-diagnosable) system is introduced. Furthermore, the conditional diagnosabilities are proved for some regular(k, t)-diagnosable and(k, t/t)-diagnosable networks such as n-dimensional hypercube network and n-dimensional star network. And then, for a system, its(k,t)-conditional diagnosability and its(k, t/t)-conditional diagnosability are identical, and in the worst case, they are equal to their traditional conditional diagnosability.展开更多
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed...In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed,the necessity for seamless information exchange has surged significantly.The existing cross-domain solutions are challenged by such issues as insufficient security,high communication overhead,and a lack of effective update mechanisms,rendering them less feasible for prolonged application on resource-limited devices.This study proposes a new cross-domain collaboration scheme based on federated chains to streamline the server-side workload.Within this framework,individual nodes solely engage in training local data and subsequently amalgamate the final model employing a federated learning algorithm to uphold enterprise systems with efficiency and security.To curtail the resource utilization of blockchains and deter malicious nodes,a node administration module predicated on the workload paradigm is introduced,enabling the release of surplus resources in response to variations in a node’s contribution metric.Upon encountering an intrusion,the system triggers an alert and logs the characteristics of the breach,facilitating a comprehensive global update across all nodes for collective defense.Experimental results across multiple scenarios have verified the security and effectiveness of the proposed solution,with no loss of its recognition accuracy.展开更多
The robust reliable guaranteed cost control for uncertain singular delay systems with actuator failures and a given quadratic cost function is studied. The system under consideration involves constant time-delay and n...The robust reliable guaranteed cost control for uncertain singular delay systems with actuator failures and a given quadratic cost function is studied. The system under consideration involves constant time-delay and norm-bounded parameter uncertainties. The purpose is to design state feedback controllers which can tolerate actuator failure, such that the closed-loop system is stable, and the specified cost function has an upper bound for all admissible uncertainties. The sufficient conditions for the solvability of this problem are obtained by a linear matrix inequality (LMI) method. Furthermore, a numerical example is given to demonstrate the applicability of the proposed approach.展开更多
Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless comm...Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless communications systems. In this paper,we present a coded cooperation scheme which employs network coding to WSN. In the scheme,the partner node forwards the combination of the source data and its own data instead of sending the source data alone. Afterward,both of the system block error rates(BLERs) and energy performance are evaluated. Experiment results show that the proposed scheme has higher energy efficiency. When Noise power spectral density is-171dBm/Hz,the energy consumption of the coded cooperation scheme is 81.1% lower than that of the single-path scheme,43.9% lower than that of the cooperation scheme to reach the target average BLER of 10-2. When the channel condition is getting worse,the energy saving effect is more obvious.展开更多
Keeping Vehicular Ad hoc Network (VANET) from attacks requires secure and efficient distribution of information about bad entitles. Negative messages are pieces of information that define the negative attributes of ...Keeping Vehicular Ad hoc Network (VANET) from attacks requires secure and efficient distribution of information about bad entitles. Negative messages are pieces of information that define the negative attributes of vehicles. By formally defining the negative message, we observe that accuracy is essential for its efficient distribution. We formally define the coverage percentage and accurate coverage percentage to describe the availability and distribution efficiency of negative message. These two metrics can jointly evaluate the performance of a distribution method. To obtain both high coverage percentage and high accurate coverage percentage, we propose meet-cloud, a scheme based on meet-table and cloud computing to securely and accurately distribute negative messages in VANET. A meet-table in a Road Side Unit (RSU) records the vehicles it encounters. All meet- tables are sent to cloud service to aggregate a global meet-table. The algorithm for distributing and redistributing negative messages are designed. Security analysis shows that meet-cloud is secure against fake and holding on to negative message attacks. Simulations and analysis demonstrate that meet-cloud is secure under denial of service and fake meet-table attacks. The simulation results also justify that meet-cloud outperforms the RSU broadcast and epidemic model.展开更多
Given that the concurrent L1-minimization(L1-min)problem is often required in some real applications,we investigate how to solve it in parallel on GPUs in this paper.First,we propose a novel self-adaptive warp impleme...Given that the concurrent L1-minimization(L1-min)problem is often required in some real applications,we investigate how to solve it in parallel on GPUs in this paper.First,we propose a novel self-adaptive warp implementation of the matrix-vector multiplication(Ax)and a novel self-adaptive thread implementation of the matrix-vector multiplication(ATx),respectively,on the GPU.The vector-operation and inner-product decision trees are adopted to choose the optimal vector-operation and inner-product kernels for vectors of any size.Second,based on the above proposed kernels,the iterative shrinkage-thresholding algorithm is utilized to present two concurrent L1-min solvers from the perspective of the streams and the thread blocks on a GPU,and optimize their performance by using the new features of GPU such as the shuffle instruction and the read-only data cache.Finally,we design a concurrent L1-min solver on multiple GPUs.The experimental results have validated the high effectiveness and good performance of our proposed methods.展开更多
In this paper, a t/(t+1)-diagnosable system is studied, which can locate a set S with |S|≤t+1 containing all faulty units only if the system has at most t faulty units. On the basis of the characterization of the t/(...In this paper, a t/(t+1)-diagnosable system is studied, which can locate a set S with |S|≤t+1 containing all faulty units only if the system has at most t faulty units. On the basis of the characterization of the t/(t+1)-diagnosable system, a necessary and sufficient condition is presented to judge whether a system is t/(t+1)-diagnosable. Meanwhile, this paper exposes some new and important properties of the t/(t+1)-diagnosable system to present the t/(t+1)-diagnosability of some networks. Furthermore, the following results for the t/(t+1)-diagnosability of some special networks are obtained: a hypercube network of n -dimensions is (3n-5)/(3n-4)-diagnosable, a star network of n -dimensions is (3n-5)/(3n-4)-diagnosable (n≥5) and a 2D-mesh (3D-mesh) with n 2(n 3) units is 8/9-diagnosable (11/12-diagnosable). This paper shows that in general, the t/(t+1)-diagnosability of a system is not only larger than its t/t -diagnosability , but also its classic diagnosability, specially the t/(t+1)-diagnosability of the hypercube network of n -dimensions is about 3 times as large as its classic t -diagnosability and about 1.5 times as large as its t/t -diagnosability.展开更多
In modern data centers, because of the deadline- agnostic congestion control in transmission control protocol (TCP), many deadline-sensitive flows can not finish before their deadlines. Therefore, providing a higher...In modern data centers, because of the deadline- agnostic congestion control in transmission control protocol (TCP), many deadline-sensitive flows can not finish before their deadlines. Therefore, providing a higher deadline meeting ratio becomes a critical challenge in the typical online data intensive (OLDI) ap- plications of data center networks (DCNs). However, a problem named as priority synchronization is found in this paper, which de- creases the deadline meeting ratio badly. To solve this problem, we propose a priority probability deceleration (P2D) deadline-aware TCP. By using the novel probabilistic deceleration, p2D prevents the priority synchronization problem. Simulation results show that P2D increases the deadline meeting ratio by 20% compared with D2TCP.展开更多
Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It i...Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs.展开更多
As a food consumed worldwide,ginger is often sulfur-fumigated.Sulfur-fumigated ginger is harmful to health.However,traditional methods to detect sulfur-fumigated ginger are expensive and unpractical for the general pu...As a food consumed worldwide,ginger is often sulfur-fumigated.Sulfur-fumigated ginger is harmful to health.However,traditional methods to detect sulfur-fumigated ginger are expensive and unpractical for the general public.In this paper,we present an efficient and convenient identification method based on image processing.First,rapid detection kits were employed to mark three levels of sulfur-fumigated gingers,and the RGB images of the gingers of each sulfur-fumigated level are collected.Second,the brightness and texture features were extracted from the images.Three machine learning methods,Support Vector Machine,Back Propagation Neural Network and Random Forest,were applied to establish prediction models.Third,the accuracy of each model was calculated and different weights were assigned for different models.Finally,models with different weights determined whether the ginger was sulfur-fumigated or non-sulfur-fumigated,and then the results were summarized to establish the final identification model.The experimental results show that the proposed method is robust.When the training set occupies 90%,the prediction accuracy is up to 100%.When the training set only occupies 10%,the accuracy remains high at 80%.Meanwhile,the proposed method is more competitive than other methods in terms of accuracy.展开更多
Conditionally t-diagnosable and t-diagnosable are important in system level diagnosis. Therefore,it is valuable to identify whether the system is conditionally t-diagnosable or t-diagnosable and derive the correspondi...Conditionally t-diagnosable and t-diagnosable are important in system level diagnosis. Therefore,it is valuable to identify whether the system is conditionally t-diagnosable or t-diagnosable and derive the corresponding conditional diagnosability and diagnosability. In the paper,distinguishable measures of pairs of distinct faulty sets with a new perspective on establishing functions are focused.Applying distinguishable function and decision function,it is determined whether a system is conditionally t-diagnosable( or t-diagnosable) or not under the PMC( Preparata,Metze,and Chien)model directly. Based on the decision function,a novel conditional diagnosability algorithm under the PMC model is introduced which can calculate conditional diagnosability rapidly.展开更多
Multicolor fluorescence of mixed halide perovskites enormously enables their applications in photonics and optoelectronics.However,it remains an arduous task to obtain multicolor emissions from perovskites containing ...Multicolor fluorescence of mixed halide perovskites enormously enables their applications in photonics and optoelectronics.However,it remains an arduous task to obtain multicolor emissions from perovskites containing single halogen to avoid phase segregation.Herein,a fluorescent composite containing Eu-based metal-organic frameworks(MOFs),OD Cs PbBre,and 3D CsPbBrs is synthesized.Under excitations at 365 nm and 254nm,the pristine composite emits blue(B)and red(R)fluorescence,which are ascribed to radiative defects within CsPbBr and 5Do→7F,transitions of Eu^(3+),respectively.Interestingly,after light soaking in the ambient environment,the blue fluorescence gradually converts into green(G)emission due to the defect repairing and 0D-3D phase conversion.This permanent and unique photochromic effect enables anticounterfeiting and microsteganography with increased security through a micropatterning technique.Moreover,the RGB luminescence is highly stable after encapsulation by a transparent polymer layer.Thus,trichromatic light-emitting modules are fabricated by using the fluorescent composites as color-converting layers,which almost fully cover the standard color gamut.Therefore,this work innovates a strategy for construction of tunable multicolor luminescence by manipulating the radiative defects and structural dimensionality.展开更多
In a dual-chamber photocatalytic fuel cell device,polyvinyl alcohol degradation and H2 evolution were concurrently achieved.The setup involved commercial P25 as the photoanode and Ag@Fe_(2)O_(3) nanoparticles as the c...In a dual-chamber photocatalytic fuel cell device,polyvinyl alcohol degradation and H2 evolution were concurrently achieved.The setup involved commercial P25 as the photoanode and Ag@Fe_(2)O_(3) nanoparticles as the cathode.Additionally,the feasibility of a Fentonlike reaction in the cathode,utilizing Fe^(2+)ions and pumped O_(2),was demonstrated.Different cathode materials,polyvinyl alcohol types,and pH values’effects were assessed on device performance.Quenching tests highlighted photoinduced holes(h+)and OH·radicals as pivotal contributions to polyvinyl alcohol degradation.Long-term stability of the device was established through cycling experiments.展开更多
Luminescent materials with multi-emission features are difficult to be replicated, which are highly desirable for advanced anti-counterfeiting. Here, we report the pioneering synthesis of Mn^(2+)/Yb^(3+)/Er^(3+) tri-d...Luminescent materials with multi-emission features are difficult to be replicated, which are highly desirable for advanced anti-counterfeiting. Here, we report the pioneering synthesis of Mn^(2+)/Yb^(3+)/Er^(3+) tri-doped Cs2Ag0.8Na0.2InCl6 double perovskites (MYE-DP), which exhibit photoluminescence (PL) covering from visible to near-infrared (NIR). The PL colors under excitations of 254 and 365 nm are notably different due to the changed relative emission intensities of self-trapped excitons (STEs) and Mn^(2+) d–d transition. Moreover, under the excitation of a NIR laser, the MYE-DP exhibits upconversion (UC) emissions of Mn^(2+) and Er^(3+). After ceasing the excitation, the long-lived trapped electrons can be thermally released to Mn^(2+) and Er^(3+) ions, resulting in both visible and NIR afterglow. Based on multi-modal emissions of the MYE-DP, we demonstrate a five-level anti-counterfeiting strategy, which significantly increases the anti-counterfeiting security. In addition, this work provides valuable insights into the energy transfer between STEs, Mn^(2+), Ln^(3+), and traps, laying a solid foundation for future development of new lead-free perovskites.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11934009,11974187,and 12004187)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK20161013 and BK20200724)。
文摘Contactless manipulation of multi-scale objects using the acoustic vortex(AV) tweezers offers tremendous perspectives in biomedical applications.However,it is still hindered by the weak acoustic radiation force(ARF) and torque(ART)around the vortex center.By introducing the elevation angle to the planar transducers of an N-element ring array,the weakfocused acoustic vortex(WFAV) composed of a main-AV and N paraxial-AVs is constructed to conduct a large-scale object manipulation.Different from the traditional focused AV(FAV) generated by a ring array of concave spherical transducers,a much larger focal region of the WFAV is generated by the main lobes of the planar transducers with the size inversely associated with the elevation angle.With the pressure simulation of the acoustic field,the capability of the rotational object driving in the focal plane for the WFAV is analyzed using the ARF and the ART exerted on an elastic ball based on acoustic scattering.With the experimental system built in water,the generation of the WFAV is verified by the scanning measurements of the acoustic field and the capability of object manipulation is also analyzed by the rotational trapping of floating particles in the focal plane.The favorable results demonstrate the feasibility of large-scale rotational manipulation of objects with a strengthened ART and a reduced acousto-thermal damage to biological tissues,showing a promising prospect for potential applications in clinical practice.
基金Supported by National Natural Science Foundation of China,No.82260581Guangxi Zhuang Autonomous Region Health Committee Scientific Research Project,No.Z20201147+3 种基金Guangxi Medical University Education and Teaching Reform Project,No.2021XJGA02Undergraduate Teaching Reform Project of Guangxi Higher Education,No.2023JGB163Guangxi Medical University Teacher Teaching Ability Development Project,No.2202JFA20China Undergraduate Innovation and Entrepreneurship Training Program,No.S202310598170.
文摘BACKGROUND Hepatocellular carcinoma(HCC)is a major health challenge with high incidence and poor survival rates in China.Systemic therapies,particularly tyrosine kinase inhibitors(TKIs),are the first-line treatment for advanced HCC,but resistance is common.The Rho GTPase family member Rho GTPase activating protein 12(ARHGAP12),which regulates cell adhesion and invasion,is a potential therapeutic target for overcoming TKI resistance in HCC.However,no studies on the expression of ARHGAP12 in HCC and its role in resistance to TKIs have been reported.AIM To unveil the expression of ARHGAP12 in HCC,its role in TKI resistance and its potential associated pathways.METHODS This study used single-cell RNA sequencing(scRNA-seq)to evaluate ARHGAP12 mRNA levels and explored its mechanisms through enrichment analysis.CellChat was used to investigate focal adhesion(FA)pathway regulation.We integrated bulk RNA data(RNA-seq and microarray),immunohistochemistry and proteomics to analyze ARHGAP12 mRNA and protein levels,correlating with clinical outcomes.We assessed ARHGAP12 expression in TKI-resistant HCC,integrated conventional HCC to explore its mechanism,identified intersecting FA pathway genes with scRNA-seq data and evaluated its response to TKI and immunotherapy.RESULTS ARHGAP12 mRNA was found to be highly expressed in malignant hepatocytes and to regulate FA.In malignant hepatocytes in high-score FA groups,MDK-[integrin alpha 6(ITGA6)+integrinβ-1(ITGB1)]showed specificity in ligand-receptor interactions.ARHGAP12 mRNA and protein were upregulated in bulk RNA,immunohistochemistry and proteomics,and higher expression was associated with a worse prognosis.ARHGAP12 was also found to be a TKI resistance gene that regulated the FA pathway.ITGB1 was identified as a crossover gene in the FA pathway in both scRNA-seq and bulk RNA.High expression of ARHGAP12 was associated with adverse reactions to sorafenib,cabozantinib and regorafenib,but not to immunotherapy.CONCLUSION ARHGAP12 expression is elevated in HCC and TKI-resistant HCC,and its regulatory role in FA may underlie the TKI-resistant phenotype.
基金supported by the National Natural Science Foundation of China(6127312661363002+3 种基金61374104)the Natural Science Foundation of Guangdong Province(10251064101000008S2012010009675)the Fundamental Research Funds for the Central Universities(2012ZM0059)
文摘This paper studies the weighted average consensus problem for networks of agents with fixed directed asymmetric unbalance information exchange topology. We suppose that the classical distributed consensus protocol is destroyed by diverse time-delays which include communication time-delay and self time-delay. Based on the generalized Nyquist stability criterion and the Gerschgorin disk theorem, some sufficient conditions for the consensus of multi-agent systems are obtained. And we give the expression of the weighted average consensus value for our consensus protocol. Finally, numerical examples are presented to illustrate the theoretical results.
基金supported by NSF of China (No.61362010,61661005)NSF of Guangxi (No.2015GXNSFAA139290,2014GXNSFBA118276,2012GXNSFAA053217)
文摘An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the relay-destination(R-D) link. A special XOR vector is defined using the correlated hard decision information blocks from two decoders and the extrinsic information exchanged between the two decoders is derived by the log-likelihood ratio(LLR) associated with the XOR vector. Such the decoding scheme is different from the traditional turbo-like detection/decoding algorithm, where the extrinsic information is computed by the side information and the soft decoder outputs. Simulations show that the presented algorithm has a slightly better performance than the traditional turbo-like algorithm(Taking the(255,175) EG-LDPC code as an example, it achieves about 0.1 dB performance gains aroundBLER=10^(-4)). Furthermore, the presented algorithm requires fewer computing operations per iteration and has faster convergence rate. For example, the average iteration of the presented algorithm is 33 at SNR=1.8 dB, which is about twice faster than that of the turbo-like algorithm, when decoding the(961,721) QC-LDPC code. Therefore, the presented decoding algorithm of correlated sources provides an alternative decoding solution for the LDPC-based relay systems.
基金supported in part by the National Natural Science Foundation Project of China under Grant No.62062009the Guangxi Innovation-Driven Development Project under Grant Nos.AA17204058-17 and AA18118047-7.
文摘Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11934009,11974187,and 12174198)
文摘Given the enhanced channel capacity of wave chirality,acoustic communications based on the orbital angular momentum(OAM)of acoustic-vortex(AV)beams are of significant interest for underwater data transmissions.However,the stringent beam alignment is required for the coaxial arrangement of transceiver arrays to ensure the accuracy and reliability of OAM decoding.To avoid the required multiple measurements of the traditional orthogonality based algorithm,the beam alignment algorithm based on the OAM spectrum decomposition is proposed for AV communications by using simplified ring-arrays.Numerical studies of the single-OAM and OAM-multiplexed AV beams show that the error of the OAM spectrum increases with the translation distance and the deflection angle of the transceiver arrays.To achieve an ideal arrangement,two methods of the single-array translation alignment and the dual-array deflection alignment are developed based on the least standard deviation of the OAM spectrum(SD-OAM).By decreasing the SD-OAM towards zero using transceiver arrays of 16 transmitters and 16 receivers,accurate beam alignments are accomplished by multiple adjustments in three dimensions.The proposed method is also demonstrated by experimental measurements of the OAM dispersion and the SD-OAM for misaligned beams.The results demonstrate the feasibility of the rapid beam alignment based on the OAM spectrum decomposition by using simplified transceiver ring-arrays,and suggest more application potentials for acoustic communications.
基金Supported by the National Natural Science Foundation of China(No.61862003,61761006)the Natural Science Foundation of Guangxi of China(No.2018GXNSFDA281052,2017GXNSFAA198263)。
文摘A new diagnosis method, called Double-Syndrome diagnostic, is proposed, which can identify faulty nodes by comparing 2 different syndromes. For the same system, the average number of faulty nodes identified correctly by the Double-Syndrome diagnostic is much greater than the t-diagnosability and the(t_1/t_1)-diagnosability of the system. Furthermore, in order to identify the remaining faulty nodes in the system, two strategies of fault diagnostic are proposed, one is called(k, t)-fault diagnosable strategy, another is called(k, t/t)-fault diagnosable strategy. Besides, the conditional(k, t)-diagnosable((k, t/t)-diagnosable) system is introduced. Furthermore, the conditional diagnosabilities are proved for some regular(k, t)-diagnosable and(k, t/t)-diagnosable networks such as n-dimensional hypercube network and n-dimensional star network. And then, for a system, its(k,t)-conditional diagnosability and its(k, t/t)-conditional diagnosability are identical, and in the worst case, they are equal to their traditional conditional diagnosability.
基金supported by the Project of National Natural Science Foundation of China under the grant titled“Research on Intermittent Fault Diagnosis of New Interconnection Networks under Comparative Model”(Approval Number:61862003).
文摘In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of enterprises.With systems spanning various sectors of enterprises geographically dispersed,the necessity for seamless information exchange has surged significantly.The existing cross-domain solutions are challenged by such issues as insufficient security,high communication overhead,and a lack of effective update mechanisms,rendering them less feasible for prolonged application on resource-limited devices.This study proposes a new cross-domain collaboration scheme based on federated chains to streamline the server-side workload.Within this framework,individual nodes solely engage in training local data and subsequently amalgamate the final model employing a federated learning algorithm to uphold enterprise systems with efficiency and security.To curtail the resource utilization of blockchains and deter malicious nodes,a node administration module predicated on the workload paradigm is introduced,enabling the release of surplus resources in response to variations in a node’s contribution metric.Upon encountering an intrusion,the system triggers an alert and logs the characteristics of the breach,facilitating a comprehensive global update across all nodes for collective defense.Experimental results across multiple scenarios have verified the security and effectiveness of the proposed solution,with no loss of its recognition accuracy.
基金supported by the National Natural Science Foundation of China (60564001)the Program for New Century Excellent Talentsin University (NCET-06-0756)
文摘The robust reliable guaranteed cost control for uncertain singular delay systems with actuator failures and a given quadratic cost function is studied. The system under consideration involves constant time-delay and norm-bounded parameter uncertainties. The purpose is to design state feedback controllers which can tolerate actuator failure, such that the closed-loop system is stable, and the specified cost function has an upper bound for all admissible uncertainties. The sufficient conditions for the solvability of this problem are obtained by a linear matrix inequality (LMI) method. Furthermore, a numerical example is given to demonstrate the applicability of the proposed approach.
基金support in part from the National Natural Science Foundation of China (No. 60962002)the Program to Sponsor Teams for Innovation in the Construction of Talent Highlands in Guangxi Institutions of Higher Learning+1 种基金the Foundation of Guangxi Key Laboratory of Information and Communication (NO. 20904)the Scientific Research Foundation of Guangxi University (Grant No.XBZ091006)
文摘Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless communications systems. In this paper,we present a coded cooperation scheme which employs network coding to WSN. In the scheme,the partner node forwards the combination of the source data and its own data instead of sending the source data alone. Afterward,both of the system block error rates(BLERs) and energy performance are evaluated. Experiment results show that the proposed scheme has higher energy efficiency. When Noise power spectral density is-171dBm/Hz,the energy consumption of the coded cooperation scheme is 81.1% lower than that of the single-path scheme,43.9% lower than that of the cooperation scheme to reach the target average BLER of 10-2. When the channel condition is getting worse,the energy saving effect is more obvious.
基金supported by the National Natural Science Foundation of China (No. 61262072)
文摘Keeping Vehicular Ad hoc Network (VANET) from attacks requires secure and efficient distribution of information about bad entitles. Negative messages are pieces of information that define the negative attributes of vehicles. By formally defining the negative message, we observe that accuracy is essential for its efficient distribution. We formally define the coverage percentage and accurate coverage percentage to describe the availability and distribution efficiency of negative message. These two metrics can jointly evaluate the performance of a distribution method. To obtain both high coverage percentage and high accurate coverage percentage, we propose meet-cloud, a scheme based on meet-table and cloud computing to securely and accurately distribute negative messages in VANET. A meet-table in a Road Side Unit (RSU) records the vehicles it encounters. All meet- tables are sent to cloud service to aggregate a global meet-table. The algorithm for distributing and redistributing negative messages are designed. Security analysis shows that meet-cloud is secure against fake and holding on to negative message attacks. Simulations and analysis demonstrate that meet-cloud is secure under denial of service and fake meet-table attacks. The simulation results also justify that meet-cloud outperforms the RSU broadcast and epidemic model.
基金The research has been supported by the Natural Science Foundation of China under great number 61872422the Natural Science Foundation of Zhejiang Province,China under great number LY19F020028.
文摘Given that the concurrent L1-minimization(L1-min)problem is often required in some real applications,we investigate how to solve it in parallel on GPUs in this paper.First,we propose a novel self-adaptive warp implementation of the matrix-vector multiplication(Ax)and a novel self-adaptive thread implementation of the matrix-vector multiplication(ATx),respectively,on the GPU.The vector-operation and inner-product decision trees are adopted to choose the optimal vector-operation and inner-product kernels for vectors of any size.Second,based on the above proposed kernels,the iterative shrinkage-thresholding algorithm is utilized to present two concurrent L1-min solvers from the perspective of the streams and the thread blocks on a GPU,and optimize their performance by using the new features of GPU such as the shuffle instruction and the read-only data cache.Finally,we design a concurrent L1-min solver on multiple GPUs.The experimental results have validated the high effectiveness and good performance of our proposed methods.
基金Supported by the National Natural Science Foundation of China(No.61862003,61761006)the Natural Science Foundation of Guangxi of China(No.2018GXNSFDA281052)
文摘In this paper, a t/(t+1)-diagnosable system is studied, which can locate a set S with |S|≤t+1 containing all faulty units only if the system has at most t faulty units. On the basis of the characterization of the t/(t+1)-diagnosable system, a necessary and sufficient condition is presented to judge whether a system is t/(t+1)-diagnosable. Meanwhile, this paper exposes some new and important properties of the t/(t+1)-diagnosable system to present the t/(t+1)-diagnosability of some networks. Furthermore, the following results for the t/(t+1)-diagnosability of some special networks are obtained: a hypercube network of n -dimensions is (3n-5)/(3n-4)-diagnosable, a star network of n -dimensions is (3n-5)/(3n-4)-diagnosable (n≥5) and a 2D-mesh (3D-mesh) with n 2(n 3) units is 8/9-diagnosable (11/12-diagnosable). This paper shows that in general, the t/(t+1)-diagnosability of a system is not only larger than its t/t -diagnosability , but also its classic diagnosability, specially the t/(t+1)-diagnosability of the hypercube network of n -dimensions is about 3 times as large as its classic t -diagnosability and about 1.5 times as large as its t/t -diagnosability.
基金supported by the National Natural Science Foundation of China(611630606110320461462007)
文摘In modern data centers, because of the deadline- agnostic congestion control in transmission control protocol (TCP), many deadline-sensitive flows can not finish before their deadlines. Therefore, providing a higher deadline meeting ratio becomes a critical challenge in the typical online data intensive (OLDI) ap- plications of data center networks (DCNs). However, a problem named as priority synchronization is found in this paper, which de- creases the deadline meeting ratio badly. To solve this problem, we propose a priority probability deceleration (P2D) deadline-aware TCP. By using the novel probabilistic deceleration, p2D prevents the priority synchronization problem. Simulation results show that P2D increases the deadline meeting ratio by 20% compared with D2TCP.
基金supported in part by the National Natural Science Foundation of China under Grant No.61772009the Natural Science Foundation of Jiangsu Province under Grant No.BK20181304.
文摘Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs.
基金the National Key Research and Development Project of China(No.2020YFD1104100)the National Natural Science Foundation of China(Nos.82204770,62101268,82074580)+4 种基金the Youth Science Foundation of Jiangsu Province(No.BK20210696)the Future Network Scientific Research Fund Project(No.FNSRFP-2021-ZD-24)the Natural Science Foundation of the Jiangsu Higher Education Institutions of China(No.20KJB510021)China Agriculture Research System of MOF and MARA(No.CARS-21)Jiangsu Province 333 High-level Talents Training Project,and the‘Qing Lan Project'in colleges and universities in Jiangsu,China.
文摘As a food consumed worldwide,ginger is often sulfur-fumigated.Sulfur-fumigated ginger is harmful to health.However,traditional methods to detect sulfur-fumigated ginger are expensive and unpractical for the general public.In this paper,we present an efficient and convenient identification method based on image processing.First,rapid detection kits were employed to mark three levels of sulfur-fumigated gingers,and the RGB images of the gingers of each sulfur-fumigated level are collected.Second,the brightness and texture features were extracted from the images.Three machine learning methods,Support Vector Machine,Back Propagation Neural Network and Random Forest,were applied to establish prediction models.Third,the accuracy of each model was calculated and different weights were assigned for different models.Finally,models with different weights determined whether the ginger was sulfur-fumigated or non-sulfur-fumigated,and then the results were summarized to establish the final identification model.The experimental results show that the proposed method is robust.When the training set occupies 90%,the prediction accuracy is up to 100%.When the training set only occupies 10%,the accuracy remains high at 80%.Meanwhile,the proposed method is more competitive than other methods in terms of accuracy.
基金Supported by the National Natural Science Foundation of China(No.61562046)Science and Technology Project of Jiangxi Provincial Education Department(No.GJJ150777,GJJ160742)
文摘Conditionally t-diagnosable and t-diagnosable are important in system level diagnosis. Therefore,it is valuable to identify whether the system is conditionally t-diagnosable or t-diagnosable and derive the corresponding conditional diagnosability and diagnosability. In the paper,distinguishable measures of pairs of distinct faulty sets with a new perspective on establishing functions are focused.Applying distinguishable function and decision function,it is determined whether a system is conditionally t-diagnosable( or t-diagnosable) or not under the PMC( Preparata,Metze,and Chien)model directly. Based on the decision function,a novel conditional diagnosability algorithm under the PMC model is introduced which can calculate conditional diagnosability rapidly.
基金supported by the Natural Science Foundation of Shandong Province(ZR2021YQ32)the Taishan Scholars Program of Shandong Province(tsqn201909117)+1 种基金support was given by the National Natural Science Foundation of China(6190i222,21802074,and 11604155)Natural Science Foundation of Jiangsu Province(BK20190697).
文摘Multicolor fluorescence of mixed halide perovskites enormously enables their applications in photonics and optoelectronics.However,it remains an arduous task to obtain multicolor emissions from perovskites containing single halogen to avoid phase segregation.Herein,a fluorescent composite containing Eu-based metal-organic frameworks(MOFs),OD Cs PbBre,and 3D CsPbBrs is synthesized.Under excitations at 365 nm and 254nm,the pristine composite emits blue(B)and red(R)fluorescence,which are ascribed to radiative defects within CsPbBr and 5Do→7F,transitions of Eu^(3+),respectively.Interestingly,after light soaking in the ambient environment,the blue fluorescence gradually converts into green(G)emission due to the defect repairing and 0D-3D phase conversion.This permanent and unique photochromic effect enables anticounterfeiting and microsteganography with increased security through a micropatterning technique.Moreover,the RGB luminescence is highly stable after encapsulation by a transparent polymer layer.Thus,trichromatic light-emitting modules are fabricated by using the fluorescent composites as color-converting layers,which almost fully cover the standard color gamut.Therefore,this work innovates a strategy for construction of tunable multicolor luminescence by manipulating the radiative defects and structural dimensionality.
基金supported by the National Natural Science Foundation of China(Grant Nos.51402161,21606140,21776147,and 52002198)the Natural Science Foundation of Shandong Province(Grant No.ZR2021YQ32)+1 种基金the Taishan Scholar Project of Shandong Province(Grant No.tsqn201909117)Hefei advanced computing center.L.F.Dong also thanks financial support from the Malmstrom Endowed Fund at Hamline University.
文摘In a dual-chamber photocatalytic fuel cell device,polyvinyl alcohol degradation and H2 evolution were concurrently achieved.The setup involved commercial P25 as the photoanode and Ag@Fe_(2)O_(3) nanoparticles as the cathode.Additionally,the feasibility of a Fentonlike reaction in the cathode,utilizing Fe^(2+)ions and pumped O_(2),was demonstrated.Different cathode materials,polyvinyl alcohol types,and pH values’effects were assessed on device performance.Quenching tests highlighted photoinduced holes(h+)and OH·radicals as pivotal contributions to polyvinyl alcohol degradation.Long-term stability of the device was established through cycling experiments.
基金supported by the Natural Science Foundation of Shandong Province(No.ZR2021YQ32)China Postdoctoral Science Foundation(No.2023M740472)+3 种基金the National Natural Science Foundation of China(Nos.62074019,62174016,and 62375028)Partial support was given by the Taishan Scholars Program of Shandong Province(No.tsqn201909117)Opening Foundation of Hubei Key Laboratory of Photoelectric Materials and Devices(No.PMD202401)the special fund for Science and Technology Innovation Teams of Shanxi Province.
文摘Luminescent materials with multi-emission features are difficult to be replicated, which are highly desirable for advanced anti-counterfeiting. Here, we report the pioneering synthesis of Mn^(2+)/Yb^(3+)/Er^(3+) tri-doped Cs2Ag0.8Na0.2InCl6 double perovskites (MYE-DP), which exhibit photoluminescence (PL) covering from visible to near-infrared (NIR). The PL colors under excitations of 254 and 365 nm are notably different due to the changed relative emission intensities of self-trapped excitons (STEs) and Mn^(2+) d–d transition. Moreover, under the excitation of a NIR laser, the MYE-DP exhibits upconversion (UC) emissions of Mn^(2+) and Er^(3+). After ceasing the excitation, the long-lived trapped electrons can be thermally released to Mn^(2+) and Er^(3+) ions, resulting in both visible and NIR afterglow. Based on multi-modal emissions of the MYE-DP, we demonstrate a five-level anti-counterfeiting strategy, which significantly increases the anti-counterfeiting security. In addition, this work provides valuable insights into the energy transfer between STEs, Mn^(2+), Ln^(3+), and traps, laying a solid foundation for future development of new lead-free perovskites.