Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.展开更多
Objectives: To evaluate the impact of adult learning and simulation-based learning (SBL) on surgical trainees’ learning experiences and Fellowship of the Royal College of Surgeons (FRCS) Section 2 General Surgery exa...Objectives: To evaluate the impact of adult learning and simulation-based learning (SBL) on surgical trainees’ learning experiences and Fellowship of the Royal College of Surgeons (FRCS) Section 2 General Surgery examination pass rate. Methods: This was a cross-sequential study involving 148 surgical candidates (72 UK trainees, 75 non-UK trainees) who had attended our revision course (Phoenix FRCS Course) from June 2017 until 2023. Each course comprised a two-day weekend preparation with dedicated sections for clinical, viva, and academic reading, incorporating SBL as its key learning style. We maintained a prospective database of candidate and course details, examination results, and feedback since the course inception. Results: We found that 97% of candidates passed the FRCS examination after their first attempt. The course was attended once by 89% of candidates, and only 3 of the 148 candidates exhausted all four attempts at the examination. Candidate feedback for the course and its style of learning was positive, with simulation-based table viva sessions and virtual clinical sessions proving the most popular learning sessions (95% and 80% of candidates attending courses run in December 2017, April 2018, and May 2021 rated them “Excellent” respectively). Conclusions: The course is centered around shared adult learning and mindfulness tools to encourage candidates to learn from each other and develop confidence and mastery in all domains of surgical practice. These methods have been shown to be effective in achieving high success rates in the Intercollegiate and International FRCS examinations for UK and overseas surgeons.展开更多
Seed size is one of the vital traits determining seed appearance, quality, and yield. Untangling the genetic mechanisms regulating soybean 100-seed weight (100-SW), seed length and seed width across environments may p...Seed size is one of the vital traits determining seed appearance, quality, and yield. Untangling the genetic mechanisms regulating soybean 100-seed weight (100-SW), seed length and seed width across environments may provide a theoretical basis for improving seed yield. However, there are few reports related to QTL mapping of 100-SW across multiple ecological regions. In this study, 21 loci associated with seed size traits were identified using a genome-wide association of 5361 single nucleotide polymorphisms (SNPs) across three ecoregions in China, which could explain 8.12%–14.25% of the phenotypic variance respectively. A new locus, named as SW9-1 on chromosome 9 that explained 10.05%–10.93% of the seed weight variance was found significantly related to seed size traits, and was not previously reported. The selection effect analysis showed that SW9-1 locus has a relatively high phenotypic effect (13.67) on 100-SW, with a greater contribution by the accessions with bigger seeds (3.69) than the accessions with small seeds (1.66). Increases in seed weight were accompanied by increases in the frequency of SW9-1T allele, with >90% of the bred varieties with a 100-SW >30 g carrying SW9-1T. Analysis of SW9-1 allelic variation in additional soybean accessions showed that SW9-1T allele accounting for 13.83% of the wild accessions, while in 46.55% and 51.57% of the landraces and bred accessions, respectively, this results indicating that the SW9-1 locus has been subjected to artificial selection during the early stages of soybean breeding, especially the utilization of SW9-1T in edamame for big seed. These results suggest that SW9-1 is a novel and reliable locus associated with seed size traits, and might have an important implication for increasing soybean seed weight in molecular design breeding. Cloning this locus in future may provide new insights into the genetic mechanisms underlying soybean seed size traits.展开更多
This study is aimed at the chemical synthesis of light-activated cobalt-doped zinc oxide and its further doping on reduced graphene oxide(RGO)and assessment of its antibacterial activity on antibiotic-resistant waterb...This study is aimed at the chemical synthesis of light-activated cobalt-doped zinc oxide and its further doping on reduced graphene oxide(RGO)and assessment of its antibacterial activity on antibiotic-resistant waterborne pathogens including Enterococcus faecalis,Staphylococcus aureus,Klebsiella pneumonia,and Pseudomonas aeruginosa.The synthesized nanoparticles were characterized via UV–vis spectroscopy,scanning electron microscopy(SEM),and energy-dispersive X-ray spectroscopy(EDS).The minimal inhibitory concentration(MIC)of nanoparticles portrayed a significant killing of both Gram-positive and Gram-negative bacteria.The synthesized nanoparticles were further found as active killers of bacteria in drinking water.Further,these nanoparticles were found photothermally active alongside ROS generators.The photokilling activity makes them ideal replacement candidates for traditional water filters.展开更多
Objective:To evaluale physico-chemical properties and antimicrobial potential of indigenous honey samples against different reference strains including Escherichia coli ATCC 8739.Enterobacter aerogenes ATCC 13048.Pseu...Objective:To evaluale physico-chemical properties and antimicrobial potential of indigenous honey samples against different reference strains including Escherichia coli ATCC 8739.Enterobacter aerogenes ATCC 13048.Pseudomonas aeruginosa ATCC 9027.Bacillus subtilis ATCC6633.Staphylococcus aureus ATCC 25923.Salmonella typhi ATCC 14028,Klebsiella pneumonia ATCC 13883.Aspergillus niger ATCC 16404.Rhizopus oligasparus PCSIR1.Candida albicans ATCC14053 and Candida utilis ATCC 9950.Methods:By using standard methods samples were evaluated for their antimicrobial properties including additive effect of starch and non—peroxidase activity,antioxidative properties(phenol contents,flavonoid contents,1,1-diphenyl-2-pierylhydrazyl radical scavenging activity).Prior to this evaluation,complete physico-chemical properties including pH,color,ash contents,protein contents,moisture contents,hydroxymethyl furfural contents,total sugar contents,reducing sugar and non-reducing sugar contents were analyzed.Results:Relatively higher ash contents were found in the Siddar honey i.e.(0.5900±0.0336)%and small honey showed relatively higher protein contents i.e.(777.598±9.880) mg/kg.The moisture contents of tested honey samples ranged between 13.8%—16,6%,total sugar contents foam 61.672%-72.420%and non-reducing sugar contents from 1.95%—3.93%.Presences of phenolic contents indicate higher antioxidant potential of these honey samples.All bacteria showed clear inhibition zones in response to tested honey samples whereas fungi and yeast showed inhibition at higher concentrations of these honey samples.For Escherichia coli.Bacillus subtilis.Salmonella typhi.Pseudomonas aeruginosa and Aspergillus niger,overall the small honey showed the higher activity than other honey samples.Conclusion:Physico-chemical analysis of honey samples confirmed good quality of honey according to the standards set by European Union Commission and Codex Alimcntarius Commission.Evaluation of these honey samples confirms antimicrobial potential of particular types of honeys indigenous to Pakistan.展开更多
In this article,the rheology of Ferro-fluid over an axisymmetric heated disc with a variable magnetic field by considering the dispersion of hybrid nanoparticles is considered.The flow is assumed to be produced by the...In this article,the rheology of Ferro-fluid over an axisymmetric heated disc with a variable magnetic field by considering the dispersion of hybrid nanoparticles is considered.The flow is assumed to be produced by the stretching of a rotating heated disc.The contribution of variable thermophysical properties is taken to explore themomentum,mass and thermal transportation.The concept of boundary layermechanismis engaged to reduce the complex problem into a simpler one in the form of coupled partial differential equations system.The complex coupled PDEs are converted into highly nonlinear coupled ordinary differential equations system(ODEs)and the resulting nonlinear flow problem is handled numerically.The solution is obtained via finite element procedure(FEP)and convergence is established by conducting the grid-independent survey.The solution of converted dimensionless problem containing fluid velocity,temperature and concentration field is plotted against numerous involved emerging parameters and their impact is noted.From the obtained solution,it is monitored that higher values of magnetic parameter retard the fluid flow and escalating values of Eckert number results in to enhance temperature profile.Ferro-fluid flow and heat energy for the case of the Yamada Ota hybrid model are higher than for the case of the Hamilton Crosser hybrid model.Developing a model is applicable to the printing process,electronic devices,temperature measurements,engineering process and food-making process.The amount of mass species is reduced vs.incline impacts of chemical reaction and Schmidt parameter.展开更多
Waterlogging is a growing threat to wheat production in high-rainfall areas.In this study,a doubled haploid(DH) population developed from a cross between Yangmai 16(waterlogging-tolerant) and Zhongmai895(waterlogging-...Waterlogging is a growing threat to wheat production in high-rainfall areas.In this study,a doubled haploid(DH) population developed from a cross between Yangmai 16(waterlogging-tolerant) and Zhongmai895(waterlogging-sensitive) was used to map quantitative trait loci(QTL) for waterlogging tolerance using a high-density 660K single-nucleotide polymorphism(SNP) array.Two experimental designs,waterlogging concrete tank(CT) and waterlogging plastic tank(PT),were used to simulate waterlogging during anthesis in five environments across three growing seasons.Waterlogging significantly decreased thousand-kernel weight(TKW) relative to non-waterlogged controls,although the degree varied across lines.Three QTL for waterlogging tolerance were identified on chromosomes 4AL,5AS,and 7DL in at least two environments.All favorable alleles were contributed by the waterlogging-tolerant parent Yangmai16.QWTC.caas-4AL exhibited pleiotropic effects on both enhancing waterlogging tolerance and decreasing plant height.Six high-confidence genes were annotated within the QTL interval.The combined effects of QWTC.caas-4AL and QWTC.caas-5AS greatly improved waterlogging tolerance,while the combined effects of all three identified QTL(QWTC.caas-4AL,QWTC.caas-5AS,and QWTC.caas-7DL) exhibited the most significant effect on waterlogging tolerance.Breeder-friendly kompetitive allele-specific PCR(KASP) markers(K_AX_111523809,K_AX_108971224,and K_AX_110553316) flanking the interval of QWTC.caas-4AL,QWTC.caas-5AS,and QWTC.caas-7DL were produced.These markers were tested in a collection of 240 wheat accessions,and three superior polymorphisms of the markers distributed over 67elite cultivars in the test population,from the Chinese provinces of Jiangsu,Anhui,and Hubei.The three KASP markers could be used for marker-assisted selection(MAS) to improve waterlogging tolerance in wheat.展开更多
Objective:To evaluate the antioxidant potential and pancreatic lipase inhibitory action of optimized hydroethanolic extracts of Solanum nigrum.Methods:Optimized extraction for maximum recovery of metabolites was perfo...Objective:To evaluate the antioxidant potential and pancreatic lipase inhibitory action of optimized hydroethanolic extracts of Solanum nigrum.Methods:Optimized extraction for maximum recovery of metabolites was performed using a combination of freeze-drying and ultrasonication followed by determination of antioxidant and antiobesity properties.The ultra-high performance liquid chromatography equipped with mass spectrometry was used to analyze metabolite profiling of Solanum nigrum.Computational studies were performed using molecular docking and electrostatic potential analysis for individual compounds.The hypolipidemic potential of the most potent extract was assessed in the obese mice fed on fat rich diet.Results:The 80%hydroethanolic extract exhibited the highest extract yield,total phenolic contents,total flavonoid contents along with the strongest 2,2-diphenyl-1-picrylhydrazyl scavenging activity,total antioxidant power,and pancreatic lipase inhibitory properties.The 80%hydroethanolic extract not only regulated the lipid profile of obese mice but also restricted the weight gain in the liver,kidney,and heart.The 80%hydroethanolic extract also reduced alanine transaminase and aspartate transaminase concentrations in serum.The effects of plant extract at 300 mg/kg body weight were quite comparable with the standard drug orlistat.Conclusions:Solanum nigrum is proved as an excellent and potent source of secondary metabolites that might be responsible for obesity mitigation.展开更多
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog...There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm.展开更多
We investigate the bounded travelling wave solutions of the Biswas-Arshed model(BAM)including the low group velocity dispersion and excluding the self-phase modulation.We integrate the nonlinear structure of the model...We investigate the bounded travelling wave solutions of the Biswas-Arshed model(BAM)including the low group velocity dispersion and excluding the self-phase modulation.We integrate the nonlinear structure of the model to obtain bounded optical solitons which pass through the optical fibers in the non-Kerr media.The bifurcation technique of the dynamical system is used to achieve the parameter bifurcation sets and split the parameter space into various areaswhich correspond to different phase portraits.All bounded optical solitons and bounded periodic wave solutions are identified and derived conforming to each region of these phase portraits.We also apply the extended sinh-Gordon equation expansion and the generalized Kudryashov integral schemes to obtain additional bounded optical soliton solutions of the BAM nonlinearity.We present more bounded optical shock waves,the bright-dark solitary wave,and optical rogue waves for the structure model via these schemes in different aspects.展开更多
Objective: Laser-induced Coulomb explosion of gold nanoparticles for breast cancer has been studied by nanophotolysis technique. This study aimed to investigate whether laser-induced bubble formation due to Coulomb e...Objective: Laser-induced Coulomb explosion of gold nanoparticles for breast cancer has been studied by nanophotolysis technique. This study aimed to investigate whether laser-induced bubble formation due to Coulomb explosion can provide an effective approach for selective damage of breast cancer with gold nanoparticles. Method: Numerical method involves laser-induced Coulomb explosion of gold nanoparticles. Different parameters related to nanophotolysis such as laser fluence, tumor depth, cluster radius, laser pulse duration, and bubble formation is studied numerically. Numerical simulation was performed using Mat lab. Results: The gold nanopartieles of 10, 20, 30, 40, and 50 nm in radius could penetrate into tumor 1.14, 1.155, 1.189, 1.20 and 1.22 cm in depth respectively. The maximum penetration depth in tumor could be obtained with nanoparticles of 50 nm radius. Short laser pulse of 40 ns with nanoparticles of 10 nm radius could penetrate into tumor 1.14 cm in depth. Bubbles with a radius of 9 pm could effectively kill breast cancer cells without damaging healthy ones. The bubble radius increased from 4 to 9 lam with an increase in pulse duration in the range of 10 to 30 ns. Conclusions: Gold nanoparticles with increasing radius and bubble formation for selective damage of breast cancer cells are successfully probed. The present calculated results are compared with other experimental findings, and good correlation is found between the present work and previous experimental values. It was demonstrated that bubble formation in tumor may further increase the efficacy of breast cancer treatment.展开更多
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv...Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms.展开更多
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve...Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis.展开更多
Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one...Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one of the biggest issues that arise.Different types of malware are wreaking havoc on the clouds.Attacks on the cloud server are happening from both internal and external sides.This paper has developed a tool to prevent the cloud server from spamming attacks.When an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)classification.Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks.However,the KNN classifiers will determine which area the spammer belongs to.At the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results.展开更多
Seedling emergence and seedling establishment are two important phases for the good crop stand and final maize crop harvest. A field study was conducted to explore the effects of different tillage practices and poultr...Seedling emergence and seedling establishment are two important phases for the good crop stand and final maize crop harvest. A field study was conducted to explore the effects of different tillage practices and poultry manure levels on the seedling emergence, growth, development, yield, and economics of the spring planted maize during 2010 and 2011. Experimental treatments include four tillage treatments (zero, minimum, conventional and deep tillage) and three poultry manure amendments (control (no manure), 5 Mg·ha-1 and 10 Mg·ha-1). Seedling emergence was linearly affected as the tillage intensity was increased. Significant relationship of tillage with leaf area index, leaf area duration, crop growth rate, net assimilation rate and total dry matter was recorded during the both years. Poultry manure at the rate of 10 Mg·ha-1 produced the higher leaf area index, leaf area duration, crop growth rate, total dry matter and grain yield as compared to 5 Mg·ha-1 and control. Moreover, experimental results concluded that the deep tillage practice has taken less time to start emergence. Similarly, higher values trend of leaf area index, leaf area duration, crop growth rate, total dry matter accumulation and grain yield was shifted from deep tillage to conventional, minimum and zero tillage practices during both years. Economically, the minimum tillage with poultry manure at rate of 10 Mg·ha-1 gave the better benefit to cost ratio and crop productivity as compared to conventional, deep and zero tillage. The experiment suggested the minimum tillage with poultry manure at the rate of 10 Mg·ha-1 may ensure the maize grain yield sustainability.展开更多
Background: Several circumstances and conditions lead to UGIB. The commonest among them peptic ulcer to an approximation of 50% in cases. The second major cause may be esoghageal varices and third is mallory-weis tear...Background: Several circumstances and conditions lead to UGIB. The commonest among them peptic ulcer to an approximation of 50% in cases. The second major cause may be esoghageal varices and third is mallory-weis tears. There are also other causes, which may include erosins, tumors and other malformations like arteriovenous. Methods: This was an observational retrospective study of all patients referred to endoscopy. The study exclusion criteria include all patients who had repeat endoscopies within one month of the previous endoscopy whereas all the patients with UGIB were included in this study. Results: We retrieved data of total 150 patients who had experienced upper gastrointestinal endoscopy during the selected time period covered in the study, March 2015 to February 2016. The mean age of the patients was 43.3 ± 13.80. 80 (53.3%) of the patients were male and 70 (46.7%) were females. Exploring more into UGIB causes the majority of patients were with esophageal varices 68 (45.3%) with male to female share was 2:1. The second most cause was esophagitis (n = 22, (14.67%)), the distribution of the cause was similar in male to female. Conclusion: We may conclude from our findings that the most common cause of UGIB is esophageal varices in our population.展开更多
Background: The EDH occurs due to the accumulation of bleeding between the inner table of the skull and the outer layer of the dura mater. It is said to account for 1% - 3% of all head injured patients and 9% of those...Background: The EDH occurs due to the accumulation of bleeding between the inner table of the skull and the outer layer of the dura mater. It is said to account for 1% - 3% of all head injured patients and 9% of those who are comatose. The only life-saving treatment of choice is evacuation of EDH via craniotomy. Methods: This was a prospective observational study, where 40 patients were in follow-up for determining the outcomes of evacuation via craniotomy. Results: Majority of the patients were young and males. The main outcome of the evacuation was favorable (recovered), but certain unfavorable outcomes were also accounted like mortality. Conclusion: The pre-surgery clinical findings like consciousness of patient were an important indicator for EDH evacuation outcome. In most of the cases, the outcome was favorable with progressive recovery.展开更多
The application of heterosis is a promising approach for greatly increasing yield in soybean(Glycine max L.). Nuclear male sterility is essential for hybrid seed production and the utilization of heterosis. Here we re...The application of heterosis is a promising approach for greatly increasing yield in soybean(Glycine max L.). Nuclear male sterility is essential for hybrid seed production and the utilization of heterosis. Here we report the cloning of the gene underlying the soybean male-sterile mutant ms-1,which has been widely used for recurrent selection in soybean breeding programs. We initially delimited the ms1 locus to a 16.15 kb region on chromosome13, based on SLAF_BSA sequencing followed by genotyping of an F_(2) population segregating for the locus. Compared with the same region in fertile plants, the mutant region lacks a sequence of approximately 38.7 kb containing five protein-coding genes, including an ortholog of the kinesin-like protein gene NACK2, named Gm Ms1. The Gm Ms1 knockout plants generated via CRISPR/Casmediated gene editing displayed a complete malesterile phenotype. Metabolic profiling showed that fertile anthers accumulated starch and sucrose normally, whereas sterile anthers had higher anthocyanin levels and lower flavonoid levels and lower antioxidant enzyme activities. These results provide insights into the molecular mechanisms governing male sterility and demonstrate that Gm Ms1 could be used to create male-sterile lines through targeted mutagenesis. These findings pave the way for designing seed production technology and an intelligent male-sterile line system to utilize heterosis in soybean.展开更多
The flux-weighted average cross sections ^(nat) Cd(γ,xn)^(115g,m,111m,109,107,105,104)Cd and ^(nat) Cd(γ,x)^113g,112,111g,110m)Ag reactions were measured at the bremsstrahlung end-point energies of 50 and 60 MeV.The...The flux-weighted average cross sections ^(nat) Cd(γ,xn)^(115g,m,111m,109,107,105,104)Cd and ^(nat) Cd(γ,x)^113g,112,111g,110m)Ag reactions were measured at the bremsstrahlung end-point energies of 50 and 60 MeV.The activa tion and off-line y-ray spectrometric technique was carried out using the 100 MeV electron linear accelerator at the Pohang Accelerator Laboratory,Korea.The ^(nat)lCd(γ,xn) reaction cross sections as a function of photon energy were theoretically calculated using the TALYS-1.95 and the EMPIRE-3.2 Malta codes.Then,the flux-weighted average cross sections were obtained from the theoretical values of mono-energetic photons.These values were compared with the flux-weighted values from the present study and were found to be in general agreement.The measured experimental reaction cross-sections and integral yields were described for cadmium and silver isotopes in the ^(nat)Cd(γ,xn)^(115g,m,111m,109,107,105,104) and ^(nat)Cd(γ,x)^(113g,112.111g,110m)Ag reactions.The isomeric yield ratio(IR) of ^(115g.m)Cd in the ^(nat)Cd(γ,xn) reaction was determined for the two bremsstrahlung end-point energies.The measured isomeric yield ratios of ^(115g,m)Cd in the ^(nat)Cd(γ,xn) reaction were also compared with the theoretical values of the nuclear model codes and previously published literature data of the ^(116)Cd(γ,x) and ^116(γ,2n) reactions.It was found that the IR value increases with increasing projectile energy,which demonstrates the characteristic of excitation energy.However,the higher IR value of ^(115g.m)Cd in the ^(116)Cd(n,2n)reaction compared to that in the ^(116)Cd(γ,x)reaction indicates the role of compound nuclear spin alongside excitation energy.展开更多
The cross sections of the ^(59)Co(n,x)reaction in the average energy range of 15.2-37.2 MeV were meas-ured using activation and an off-line γ-ray spectrometric technique.The neutrons were generated from the ^(9)Be(p,...The cross sections of the ^(59)Co(n,x)reaction in the average energy range of 15.2-37.2 MeV were meas-ured using activation and an off-line γ-ray spectrometric technique.The neutrons were generated from the ^(9)Be(p,n)reaction with proton beam energies of 25-45 MeV at the MC-50 Cyclotron facility of the Korean Institute of Radi-ological and Medical Sciences(KIRAMS).Theoretical cal lculations of neutron-induced reactions on ^(59)Co were per-formed using the nuclear model code TALYS-1.9.The results for the ^(59)Co(n,x)reactions were compared with the theoretical values obtained using TALYS-1.9 and the literature data provided in EXFOR and the TENDL 2019 nuc-lear data library.The theoretical values obtained using TALYS-1.9 with adjusted parameters are comparable to the experimental data.The measured reaction cross sections of a few radionuclides are new,and the others are compar-able to the literature data,and thus,they can strengthen the database.The present study on cross sections leads to useful insight into the mechanisms of ^(59)Co(n,x)reactions.展开更多
基金Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
文摘Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
文摘Objectives: To evaluate the impact of adult learning and simulation-based learning (SBL) on surgical trainees’ learning experiences and Fellowship of the Royal College of Surgeons (FRCS) Section 2 General Surgery examination pass rate. Methods: This was a cross-sequential study involving 148 surgical candidates (72 UK trainees, 75 non-UK trainees) who had attended our revision course (Phoenix FRCS Course) from June 2017 until 2023. Each course comprised a two-day weekend preparation with dedicated sections for clinical, viva, and academic reading, incorporating SBL as its key learning style. We maintained a prospective database of candidate and course details, examination results, and feedback since the course inception. Results: We found that 97% of candidates passed the FRCS examination after their first attempt. The course was attended once by 89% of candidates, and only 3 of the 148 candidates exhausted all four attempts at the examination. Candidate feedback for the course and its style of learning was positive, with simulation-based table viva sessions and virtual clinical sessions proving the most popular learning sessions (95% and 80% of candidates attending courses run in December 2017, April 2018, and May 2021 rated them “Excellent” respectively). Conclusions: The course is centered around shared adult learning and mindfulness tools to encourage candidates to learn from each other and develop confidence and mastery in all domains of surgical practice. These methods have been shown to be effective in achieving high success rates in the Intercollegiate and International FRCS examinations for UK and overseas surgeons.
基金supported by the National Key Research and Development Program of China (2016YFD0100201)the National Natural Science Foundation of China (31771819)+2 种基金the China Postdoctoral Science Foundation (2017M621990)the Introduced Leading Talent Research Team for Universities in Anhui Provincethe Natural Science Foundation of Anhui Province, China (1608085QC66)
文摘Seed size is one of the vital traits determining seed appearance, quality, and yield. Untangling the genetic mechanisms regulating soybean 100-seed weight (100-SW), seed length and seed width across environments may provide a theoretical basis for improving seed yield. However, there are few reports related to QTL mapping of 100-SW across multiple ecological regions. In this study, 21 loci associated with seed size traits were identified using a genome-wide association of 5361 single nucleotide polymorphisms (SNPs) across three ecoregions in China, which could explain 8.12%–14.25% of the phenotypic variance respectively. A new locus, named as SW9-1 on chromosome 9 that explained 10.05%–10.93% of the seed weight variance was found significantly related to seed size traits, and was not previously reported. The selection effect analysis showed that SW9-1 locus has a relatively high phenotypic effect (13.67) on 100-SW, with a greater contribution by the accessions with bigger seeds (3.69) than the accessions with small seeds (1.66). Increases in seed weight were accompanied by increases in the frequency of SW9-1T allele, with >90% of the bred varieties with a 100-SW >30 g carrying SW9-1T. Analysis of SW9-1 allelic variation in additional soybean accessions showed that SW9-1T allele accounting for 13.83% of the wild accessions, while in 46.55% and 51.57% of the landraces and bred accessions, respectively, this results indicating that the SW9-1 locus has been subjected to artificial selection during the early stages of soybean breeding, especially the utilization of SW9-1T in edamame for big seed. These results suggest that SW9-1 is a novel and reliable locus associated with seed size traits, and might have an important implication for increasing soybean seed weight in molecular design breeding. Cloning this locus in future may provide new insights into the genetic mechanisms underlying soybean seed size traits.
文摘This study is aimed at the chemical synthesis of light-activated cobalt-doped zinc oxide and its further doping on reduced graphene oxide(RGO)and assessment of its antibacterial activity on antibiotic-resistant waterborne pathogens including Enterococcus faecalis,Staphylococcus aureus,Klebsiella pneumonia,and Pseudomonas aeruginosa.The synthesized nanoparticles were characterized via UV–vis spectroscopy,scanning electron microscopy(SEM),and energy-dispersive X-ray spectroscopy(EDS).The minimal inhibitory concentration(MIC)of nanoparticles portrayed a significant killing of both Gram-positive and Gram-negative bacteria.The synthesized nanoparticles were further found as active killers of bacteria in drinking water.Further,these nanoparticles were found photothermally active alongside ROS generators.The photokilling activity makes them ideal replacement candidates for traditional water filters.
基金Supported partly by Higher Education Commission Pakistan,(via IPFP Grant No.3782)
文摘Objective:To evaluale physico-chemical properties and antimicrobial potential of indigenous honey samples against different reference strains including Escherichia coli ATCC 8739.Enterobacter aerogenes ATCC 13048.Pseudomonas aeruginosa ATCC 9027.Bacillus subtilis ATCC6633.Staphylococcus aureus ATCC 25923.Salmonella typhi ATCC 14028,Klebsiella pneumonia ATCC 13883.Aspergillus niger ATCC 16404.Rhizopus oligasparus PCSIR1.Candida albicans ATCC14053 and Candida utilis ATCC 9950.Methods:By using standard methods samples were evaluated for their antimicrobial properties including additive effect of starch and non—peroxidase activity,antioxidative properties(phenol contents,flavonoid contents,1,1-diphenyl-2-pierylhydrazyl radical scavenging activity).Prior to this evaluation,complete physico-chemical properties including pH,color,ash contents,protein contents,moisture contents,hydroxymethyl furfural contents,total sugar contents,reducing sugar and non-reducing sugar contents were analyzed.Results:Relatively higher ash contents were found in the Siddar honey i.e.(0.5900±0.0336)%and small honey showed relatively higher protein contents i.e.(777.598±9.880) mg/kg.The moisture contents of tested honey samples ranged between 13.8%—16,6%,total sugar contents foam 61.672%-72.420%and non-reducing sugar contents from 1.95%—3.93%.Presences of phenolic contents indicate higher antioxidant potential of these honey samples.All bacteria showed clear inhibition zones in response to tested honey samples whereas fungi and yeast showed inhibition at higher concentrations of these honey samples.For Escherichia coli.Bacillus subtilis.Salmonella typhi.Pseudomonas aeruginosa and Aspergillus niger,overall the small honey showed the higher activity than other honey samples.Conclusion:Physico-chemical analysis of honey samples confirmed good quality of honey according to the standards set by European Union Commission and Codex Alimcntarius Commission.Evaluation of these honey samples confirms antimicrobial potential of particular types of honeys indigenous to Pakistan.
文摘In this article,the rheology of Ferro-fluid over an axisymmetric heated disc with a variable magnetic field by considering the dispersion of hybrid nanoparticles is considered.The flow is assumed to be produced by the stretching of a rotating heated disc.The contribution of variable thermophysical properties is taken to explore themomentum,mass and thermal transportation.The concept of boundary layermechanismis engaged to reduce the complex problem into a simpler one in the form of coupled partial differential equations system.The complex coupled PDEs are converted into highly nonlinear coupled ordinary differential equations system(ODEs)and the resulting nonlinear flow problem is handled numerically.The solution is obtained via finite element procedure(FEP)and convergence is established by conducting the grid-independent survey.The solution of converted dimensionless problem containing fluid velocity,temperature and concentration field is plotted against numerous involved emerging parameters and their impact is noted.From the obtained solution,it is monitored that higher values of magnetic parameter retard the fluid flow and escalating values of Eckert number results in to enhance temperature profile.Ferro-fluid flow and heat energy for the case of the Yamada Ota hybrid model are higher than for the case of the Hamilton Crosser hybrid model.Developing a model is applicable to the printing process,electronic devices,temperature measurements,engineering process and food-making process.The amount of mass species is reduced vs.incline impacts of chemical reaction and Schmidt parameter.
基金Chinese Scholarship Council for financial support (202203250009)financially supported by the Key Research and Development Program of Hubei Province (2021BBA225)+1 种基金the Agricultural Science and Technology Innovation Programthe Fundamental Research Funds for Central Non-Profit of the Institute of Crop Sciences, CAAS。
文摘Waterlogging is a growing threat to wheat production in high-rainfall areas.In this study,a doubled haploid(DH) population developed from a cross between Yangmai 16(waterlogging-tolerant) and Zhongmai895(waterlogging-sensitive) was used to map quantitative trait loci(QTL) for waterlogging tolerance using a high-density 660K single-nucleotide polymorphism(SNP) array.Two experimental designs,waterlogging concrete tank(CT) and waterlogging plastic tank(PT),were used to simulate waterlogging during anthesis in five environments across three growing seasons.Waterlogging significantly decreased thousand-kernel weight(TKW) relative to non-waterlogged controls,although the degree varied across lines.Three QTL for waterlogging tolerance were identified on chromosomes 4AL,5AS,and 7DL in at least two environments.All favorable alleles were contributed by the waterlogging-tolerant parent Yangmai16.QWTC.caas-4AL exhibited pleiotropic effects on both enhancing waterlogging tolerance and decreasing plant height.Six high-confidence genes were annotated within the QTL interval.The combined effects of QWTC.caas-4AL and QWTC.caas-5AS greatly improved waterlogging tolerance,while the combined effects of all three identified QTL(QWTC.caas-4AL,QWTC.caas-5AS,and QWTC.caas-7DL) exhibited the most significant effect on waterlogging tolerance.Breeder-friendly kompetitive allele-specific PCR(KASP) markers(K_AX_111523809,K_AX_108971224,and K_AX_110553316) flanking the interval of QWTC.caas-4AL,QWTC.caas-5AS,and QWTC.caas-7DL were produced.These markers were tested in a collection of 240 wheat accessions,and three superior polymorphisms of the markers distributed over 67elite cultivars in the test population,from the Chinese provinces of Jiangsu,Anhui,and Hubei.The three KASP markers could be used for marker-assisted selection(MAS) to improve waterlogging tolerance in wheat.
文摘Objective:To evaluate the antioxidant potential and pancreatic lipase inhibitory action of optimized hydroethanolic extracts of Solanum nigrum.Methods:Optimized extraction for maximum recovery of metabolites was performed using a combination of freeze-drying and ultrasonication followed by determination of antioxidant and antiobesity properties.The ultra-high performance liquid chromatography equipped with mass spectrometry was used to analyze metabolite profiling of Solanum nigrum.Computational studies were performed using molecular docking and electrostatic potential analysis for individual compounds.The hypolipidemic potential of the most potent extract was assessed in the obese mice fed on fat rich diet.Results:The 80%hydroethanolic extract exhibited the highest extract yield,total phenolic contents,total flavonoid contents along with the strongest 2,2-diphenyl-1-picrylhydrazyl scavenging activity,total antioxidant power,and pancreatic lipase inhibitory properties.The 80%hydroethanolic extract not only regulated the lipid profile of obese mice but also restricted the weight gain in the liver,kidney,and heart.The 80%hydroethanolic extract also reduced alanine transaminase and aspartate transaminase concentrations in serum.The effects of plant extract at 300 mg/kg body weight were quite comparable with the standard drug orlistat.Conclusions:Solanum nigrum is proved as an excellent and potent source of secondary metabolites that might be responsible for obesity mitigation.
基金This research was supported by the Researchers supporting program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
文摘There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm.
基金supported by the Deanship of ScientificResearch,Prince Sattam bin Abdulaziz University,Alkharj,Saudi Arabia,under Grant No.2021/01/19122.
文摘We investigate the bounded travelling wave solutions of the Biswas-Arshed model(BAM)including the low group velocity dispersion and excluding the self-phase modulation.We integrate the nonlinear structure of the model to obtain bounded optical solitons which pass through the optical fibers in the non-Kerr media.The bifurcation technique of the dynamical system is used to achieve the parameter bifurcation sets and split the parameter space into various areaswhich correspond to different phase portraits.All bounded optical solitons and bounded periodic wave solutions are identified and derived conforming to each region of these phase portraits.We also apply the extended sinh-Gordon equation expansion and the generalized Kudryashov integral schemes to obtain additional bounded optical soliton solutions of the BAM nonlinearity.We present more bounded optical shock waves,the bright-dark solitary wave,and optical rogue waves for the structure model via these schemes in different aspects.
基金financial support by by Fund of the Ministry of Higher Education(MOHE)Malaysia and Universiti Teknologi Malaysia(UTM)Skudai,Johor,Malaysia under Grant No Q.J130000.2526.02H93/-03H78
文摘Objective: Laser-induced Coulomb explosion of gold nanoparticles for breast cancer has been studied by nanophotolysis technique. This study aimed to investigate whether laser-induced bubble formation due to Coulomb explosion can provide an effective approach for selective damage of breast cancer with gold nanoparticles. Method: Numerical method involves laser-induced Coulomb explosion of gold nanoparticles. Different parameters related to nanophotolysis such as laser fluence, tumor depth, cluster radius, laser pulse duration, and bubble formation is studied numerically. Numerical simulation was performed using Mat lab. Results: The gold nanopartieles of 10, 20, 30, 40, and 50 nm in radius could penetrate into tumor 1.14, 1.155, 1.189, 1.20 and 1.22 cm in depth respectively. The maximum penetration depth in tumor could be obtained with nanoparticles of 50 nm radius. Short laser pulse of 40 ns with nanoparticles of 10 nm radius could penetrate into tumor 1.14 cm in depth. Bubbles with a radius of 9 pm could effectively kill breast cancer cells without damaging healthy ones. The bubble radius increased from 4 to 9 lam with an increase in pulse duration in the range of 10 to 30 ns. Conclusions: Gold nanoparticles with increasing radius and bubble formation for selective damage of breast cancer cells are successfully probed. The present calculated results are compared with other experimental findings, and good correlation is found between the present work and previous experimental values. It was demonstrated that bubble formation in tumor may further increase the efficacy of breast cancer treatment.
文摘Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms.
文摘Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis.
文摘Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one of the biggest issues that arise.Different types of malware are wreaking havoc on the clouds.Attacks on the cloud server are happening from both internal and external sides.This paper has developed a tool to prevent the cloud server from spamming attacks.When an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)classification.Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks.However,the KNN classifiers will determine which area the spammer belongs to.At the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results.
文摘Seedling emergence and seedling establishment are two important phases for the good crop stand and final maize crop harvest. A field study was conducted to explore the effects of different tillage practices and poultry manure levels on the seedling emergence, growth, development, yield, and economics of the spring planted maize during 2010 and 2011. Experimental treatments include four tillage treatments (zero, minimum, conventional and deep tillage) and three poultry manure amendments (control (no manure), 5 Mg·ha-1 and 10 Mg·ha-1). Seedling emergence was linearly affected as the tillage intensity was increased. Significant relationship of tillage with leaf area index, leaf area duration, crop growth rate, net assimilation rate and total dry matter was recorded during the both years. Poultry manure at the rate of 10 Mg·ha-1 produced the higher leaf area index, leaf area duration, crop growth rate, total dry matter and grain yield as compared to 5 Mg·ha-1 and control. Moreover, experimental results concluded that the deep tillage practice has taken less time to start emergence. Similarly, higher values trend of leaf area index, leaf area duration, crop growth rate, total dry matter accumulation and grain yield was shifted from deep tillage to conventional, minimum and zero tillage practices during both years. Economically, the minimum tillage with poultry manure at rate of 10 Mg·ha-1 gave the better benefit to cost ratio and crop productivity as compared to conventional, deep and zero tillage. The experiment suggested the minimum tillage with poultry manure at the rate of 10 Mg·ha-1 may ensure the maize grain yield sustainability.
文摘Background: Several circumstances and conditions lead to UGIB. The commonest among them peptic ulcer to an approximation of 50% in cases. The second major cause may be esoghageal varices and third is mallory-weis tears. There are also other causes, which may include erosins, tumors and other malformations like arteriovenous. Methods: This was an observational retrospective study of all patients referred to endoscopy. The study exclusion criteria include all patients who had repeat endoscopies within one month of the previous endoscopy whereas all the patients with UGIB were included in this study. Results: We retrieved data of total 150 patients who had experienced upper gastrointestinal endoscopy during the selected time period covered in the study, March 2015 to February 2016. The mean age of the patients was 43.3 ± 13.80. 80 (53.3%) of the patients were male and 70 (46.7%) were females. Exploring more into UGIB causes the majority of patients were with esophageal varices 68 (45.3%) with male to female share was 2:1. The second most cause was esophagitis (n = 22, (14.67%)), the distribution of the cause was similar in male to female. Conclusion: We may conclude from our findings that the most common cause of UGIB is esophageal varices in our population.
文摘Background: The EDH occurs due to the accumulation of bleeding between the inner table of the skull and the outer layer of the dura mater. It is said to account for 1% - 3% of all head injured patients and 9% of those who are comatose. The only life-saving treatment of choice is evacuation of EDH via craniotomy. Methods: This was a prospective observational study, where 40 patients were in follow-up for determining the outcomes of evacuation via craniotomy. Results: Majority of the patients were young and males. The main outcome of the evacuation was favorable (recovered), but certain unfavorable outcomes were also accounted like mortality. Conclusion: The pre-surgery clinical findings like consciousness of patient were an important indicator for EDH evacuation outcome. In most of the cases, the outcome was favorable with progressive recovery.
基金supported by the National Key Research and Development Program of China(2016YFD0100201)the National Natural Science Foundation of China(31771819)+1 种基金the National Natural Science Foundation of Anhui Province,China(1908085QC105)the Research Fundsfor Academic and Technological Leaders and Reserve Candidates in Anhui Province(RC312005)。
文摘The application of heterosis is a promising approach for greatly increasing yield in soybean(Glycine max L.). Nuclear male sterility is essential for hybrid seed production and the utilization of heterosis. Here we report the cloning of the gene underlying the soybean male-sterile mutant ms-1,which has been widely used for recurrent selection in soybean breeding programs. We initially delimited the ms1 locus to a 16.15 kb region on chromosome13, based on SLAF_BSA sequencing followed by genotyping of an F_(2) population segregating for the locus. Compared with the same region in fertile plants, the mutant region lacks a sequence of approximately 38.7 kb containing five protein-coding genes, including an ortholog of the kinesin-like protein gene NACK2, named Gm Ms1. The Gm Ms1 knockout plants generated via CRISPR/Casmediated gene editing displayed a complete malesterile phenotype. Metabolic profiling showed that fertile anthers accumulated starch and sucrose normally, whereas sterile anthers had higher anthocyanin levels and lower flavonoid levels and lower antioxidant enzyme activities. These results provide insights into the molecular mechanisms governing male sterility and demonstrate that Gm Ms1 could be used to create male-sterile lines through targeted mutagenesis. These findings pave the way for designing seed production technology and an intelligent male-sterile line system to utilize heterosis in soybean.
基金Supported by the National Research Foundation of Korea(NRF)through a grant provided by the Ministry of Science and ICT(NRF-2017R1D1A1B03030484,NRF-2013M7A1A1075764,NRF-2018R1A6A1A06024970)。
文摘The flux-weighted average cross sections ^(nat) Cd(γ,xn)^(115g,m,111m,109,107,105,104)Cd and ^(nat) Cd(γ,x)^113g,112,111g,110m)Ag reactions were measured at the bremsstrahlung end-point energies of 50 and 60 MeV.The activa tion and off-line y-ray spectrometric technique was carried out using the 100 MeV electron linear accelerator at the Pohang Accelerator Laboratory,Korea.The ^(nat)lCd(γ,xn) reaction cross sections as a function of photon energy were theoretically calculated using the TALYS-1.95 and the EMPIRE-3.2 Malta codes.Then,the flux-weighted average cross sections were obtained from the theoretical values of mono-energetic photons.These values were compared with the flux-weighted values from the present study and were found to be in general agreement.The measured experimental reaction cross-sections and integral yields were described for cadmium and silver isotopes in the ^(nat)Cd(γ,xn)^(115g,m,111m,109,107,105,104) and ^(nat)Cd(γ,x)^(113g,112.111g,110m)Ag reactions.The isomeric yield ratio(IR) of ^(115g.m)Cd in the ^(nat)Cd(γ,xn) reaction was determined for the two bremsstrahlung end-point energies.The measured isomeric yield ratios of ^(115g,m)Cd in the ^(nat)Cd(γ,xn) reaction were also compared with the theoretical values of the nuclear model codes and previously published literature data of the ^(116)Cd(γ,x) and ^116(γ,2n) reactions.It was found that the IR value increases with increasing projectile energy,which demonstrates the characteristic of excitation energy.However,the higher IR value of ^(115g.m)Cd in the ^(116)Cd(n,2n)reaction compared to that in the ^(116)Cd(γ,x)reaction indicates the role of compound nuclear spin alongside excitation energy.
基金National Research Foundation of Korea(NRF)through a grant provided by the Ministry of Science and ICT(NRF-2017R ID1A1B03030484,NRF-2013M7A1A1075764,NRF-2018R1A6A1A06024970)。
文摘The cross sections of the ^(59)Co(n,x)reaction in the average energy range of 15.2-37.2 MeV were meas-ured using activation and an off-line γ-ray spectrometric technique.The neutrons were generated from the ^(9)Be(p,n)reaction with proton beam energies of 25-45 MeV at the MC-50 Cyclotron facility of the Korean Institute of Radi-ological and Medical Sciences(KIRAMS).Theoretical cal lculations of neutron-induced reactions on ^(59)Co were per-formed using the nuclear model code TALYS-1.9.The results for the ^(59)Co(n,x)reactions were compared with the theoretical values obtained using TALYS-1.9 and the literature data provided in EXFOR and the TENDL 2019 nuc-lear data library.The theoretical values obtained using TALYS-1.9 with adjusted parameters are comparable to the experimental data.The measured reaction cross sections of a few radionuclides are new,and the others are compar-able to the literature data,and thus,they can strengthen the database.The present study on cross sections leads to useful insight into the mechanisms of ^(59)Co(n,x)reactions.