In this paper,we propose a random access scheme termed sign-compute diversity slotted ALOHA(SCDSA).The SCDSA scheme combines diversity transmission with compute-and-forward.Without considering the capture effect and m...In this paper,we propose a random access scheme termed sign-compute diversity slotted ALOHA(SCDSA).The SCDSA scheme combines diversity transmission with compute-and-forward.Without considering the capture effect and multiple user detection techniques,our scheme can reach a high throughput of 0.98 without feedback under finite frame size settings,where the upper bound on performance is 1.Moreover,a lower bound on throughput performance is derived,which is tight in some parameter settings and can be used to approximate theoretical performance.Simulation results validate our analysis and confirm the advantages of our proposed scheme.展开更多
After securing a market for their dried red chilli peppers in China,elated farmers in Uganda are expanding the spicy crop cultivation to thousands of acres.China’s increasing appetite for international cuisine and sp...After securing a market for their dried red chilli peppers in China,elated farmers in Uganda are expanding the spicy crop cultivation to thousands of acres.China’s increasing appetite for international cuisine and spices has created a most welcome demand for high-quality chillies.And given Uganda’s unique climate and soil conditions that allow for diverse chilli varieties,the East African country has a competitive edge.This has led to Uganda and China now having trade agreements in place,facilitating exports.展开更多
As an important resource in data link,time slots should be strategically allocated to enhance transmission efficiency and resist eavesdropping,especially considering the tremendous increase in the number of nodes and ...As an important resource in data link,time slots should be strategically allocated to enhance transmission efficiency and resist eavesdropping,especially considering the tremendous increase in the number of nodes and diverse communication needs.It is crucial to design control sequences with robust randomness and conflict-freeness to properly address differentiated access control in data link.In this paper,we propose a hierarchical access control scheme based on control sequences to achieve high utilization of time slots and differentiated access control.A theoretical bound of the hierarchical control sequence set is derived to characterize the constraints on the parameters of the sequence set.Moreover,two classes of optimal hierarchical control sequence sets satisfying the theoretical bound are constructed,both of which enable the scheme to achieve maximum utilization of time slots.Compared with the fixed time slot allocation scheme,our scheme reduces the symbol error rate by up to 9%,which indicates a significant improvement in anti-interference and eavesdropping capabilities.展开更多
The accessibility of urban public transit directly influences residents’quality of life,travel behavior,and social equity.Its correlation with housing prices has garnered significant attention across disciplines such...The accessibility of urban public transit directly influences residents’quality of life,travel behavior,and social equity.Its correlation with housing prices has garnered significant attention across disciplines such as geography,economics,and urban planning.Although much existing research focuses on the impact of individual transportation facilities on housing prices,there is a notable gap in comprehensive analyses that assess the influence of overall urban transit accessibility on housing market dynamics.This study selected the main urban area of Hefei,China,as a case to investigate the spatial distribution of housing prices and evaluate public transit accessibility in 2022.Employing techniques such as the optimized parameter geographical detector and local spatial regression models,the study aimed to elucidate the effects and underlying mechanisms of urban transit accessibility on housing prices.The findings revealed that:1)housing prices in Hefei exhibited a clustered spatial pattern,with high prices concentrated in the city center and lower prices in peripheral areas,forming three distinct high-price hotspots with a‘belt-like’distribution;2)public transit accessibility showed a‘coreperiphery’structure,with accessibility declining in a‘circumferential’pattern around the city center.Based on the‘housing price-accessibility’dimension,four categories were identified:high price-high accessibility(37.25%),high price-low accessibility(19.07%),low price-high accessibility(21.95%),and low price-low accessibility(21.73%);3)the impact of transit accessibility on housing prices was spatially heterogeneous,with bus travel showing the strongest explanatory power(0.692),followed by automobile,subway,and bicycle travel.The interaction of these transportation modes generated a synergistic effect on housing price differentiation,with most influencing factors contributing more than 25%.These findings offer valuable insights for optimizing the spatial distribution of public transit infrastructure and improving both urban housing quality and residents’living standards.展开更多
Central nervous system(CNS) axons fail to regenerate following brain or spinal cord injury(SCI),which typically leads to permanent neurological deficits.Peripheral nervous system axons,howeve r,can regenerate followin...Central nervous system(CNS) axons fail to regenerate following brain or spinal cord injury(SCI),which typically leads to permanent neurological deficits.Peripheral nervous system axons,howeve r,can regenerate following injury.Understanding the mechanisms that underlie this difference is key to developing treatments for CNS neurological diseases and injuries characterized by axonal damage.To initiate repair after peripheral nerve injury,dorsal root ganglion(DRG) neurons mobilize a pro-regenerative gene expression program,which facilitates axon outgrowth.展开更多
Under the background of‘the Belt and Road’and‘China-Mongolia-Russia Economic Corridor’initiatives,this paper studied the urban accessibility level,regional accessibility pattern and regional spatial effects along ...Under the background of‘the Belt and Road’and‘China-Mongolia-Russia Economic Corridor’initiatives,this paper studied the urban accessibility level,regional accessibility pattern and regional spatial effects along the Primorsky No.1 and No.2 transportation corridors.First,the evaluation of urban accessibility level with and without Primorsky No.1 and No.2 high-speed rails(HSRs)opening was conducted with two indicators,i.e.,the weighted average travel time,and the economic potential.After the evaluation,the spatial differentiation pattern of the accessibility changes with and without Primorsky No.1 and No.2 HSRs opening was performed respectively using ArcGIS.On these bases,the regional spatial effects brought by Primorsky No.1 and No.2 HSRs opening were studied.The results are as following.First,the urban accessibility level will be greatly improved by the opening of Primorsky No.1 and No.2 HSRs.All adjacent cities will be integrated into‘1 h HSR communication circle’and the whole journey will be integrated into‘4 h HSR communication circle’along Primorsky No.1 and No.2 corridors,respectively.The HSR accessibility of Primorsky No.1 corridor is stronger than that of Primorsky No.2 corridor.But the HSR accessibility improvement degree of Primorsky No.1 corridor is weaker than that of Primorsky No.2 corridor.Second,spatially,along Primorsky No.1 and No.2 corridors,the HSR accessibility level of the cities which are located in China is stronger than those cities located in Russia,showing the‘High West,Low East’patterns.The HSR accessibility improvement degree of the cities which are located in Russia and Sino-Russian border is stronger than those cities located in China,showing the‘High East,Low West’patterns.Third,Primorsky No.1 and No.2 corridors could connect the China’s‘Heilongjiang Land Sea Silk Road Economic Belt’and‘Changchun-Jilin-Tumen Development Pilot Zone’respectively,gradually involving into the development of China’s Harbin-Changchun Megalopolis.Relying on Harbin(China)and Changchun(China),Primorsky No.1 and No.2 HSRs could connect Northeast China-Beijing HSR,accelerating the diffusion of population,economy and other flows from China’s Beijing-Tianjin-Hebei Urban Agglomeration to Northeast China,and then to Russia’s Far East Federal District.Relying on Suifenhe(China)and Hunchun(China),Primorsky No.1 and No.2 HSRs could be conducive to the development of the second largest sea channels for Northeast China,creating the Northeast Asian Urban Belt,and new sea-rail intermodal pattern among China,Russia,Democratic People’s Republic of Korea,Japan and Republic of Korea.Relying on Vladivostok(Russia)and Zarubino(Russia),Primorsky No.1 and No.2 corridors could connect the‘Ice Silk Road’,building the‘Sino-Russian Northern Maritime Corridor’and‘Sino-Russian Arctic Blue Economic Areas’.展开更多
The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic...The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.展开更多
Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets...Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets such as roles,specialties,or certifications.This data-centric cryptographic paradigm enables highly fine-grained,policydriven access control,minimizing the need for identity management and supporting scalable multi-user scenarios.This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade.It explores the evolution of these schemes,analyzing their design principles,strengths,limitations,and the level of granularity they offer in access control.The review also evaluates the security guarantees,efficiency,and practical applicability of these schemes in real-world healthcare environments.Furthermore,the paper outlines the current state of ABE as a mechanism for safeguarding EHR data and managing user access,while also identifying the key challenges that remain.Open issues such as scalability,revocation mechanisms,policy updates,and interoperability are discussed in detail,providing valuable insights for researchers and practitioners aiming to advance the secure management of health information systems.展开更多
High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication sys...High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.展开更多
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens...The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach.展开更多
BACKGROUND Central venous access is essential for administering chemotherapy in patients with gastrointestinal cancer.Peripherally inserted central catheters(PICC)and totally implantable venous access ports(TIVAP)are ...BACKGROUND Central venous access is essential for administering chemotherapy in patients with gastrointestinal cancer.Peripherally inserted central catheters(PICC)and totally implantable venous access ports(TIVAP)are widely used,but comparative data regarding their impact on catheter-related complications and quality of life(QoL)remain limited.AIM To evaluate the impact of TIVAPs compared with PICC on catheter-related complications and QoL in patients with gastrointestinal cancer undergoing chemotherapy.METHODS This retrospective study included adults with gastrointestinal cancer who underwent central venous access device insertion for chemotherapy at our institution between December 2021 and December 2024.Inclusion criteria encompassed indications for intermittent intravenous chemotherapy,anticipated treatment duration of≥12 weeks,an adequate preoperative hematologic profile,accessible upper body veins,and complete medical records.Patients were excluded if they had an anticipated survival of less than three months,active systemic infection,severe thrombosis or coagulopathy,communication barriers,or an urgent need for dialysis access.Patients were assigned to either the PICC or TIVAP group based on device type.Data collected included demographic variables,cancer characteristics,insertion procedure details,complications,and QoL,assessed via the EuroQol 5-Dimensions-3 levels,visual analogue scale,and the European Organization for Research and Treatment of Cancer QoL Questionnaire-Core 30.RESULTS A total of 346 patients were analyzed.Baseline demographic,clinical,and cancer characteristics were similar between groups.The TIVAP group demonstrated a significantly lower incidence of catheter-related complications than the PICC group,with no pneumothorax occurring in either group.QoL assessments at baseline were comparable.At one month,the TIVAP group exhibited significantly higher EuroQoL Five Dimensions health state scores and QLQ-C30 global health status scores.Multivariate analysis identified TIVAP use,catheter tip placement in the distal superior vena cava/right atrium,prophylactic antibiotic administration,and antimicrobial dressing application as independent protective factors associated with reduced complications and improved QoL.CONCLUSION In patients with gastrointestinal cancer undergoing chemotherapy,TIVAPs are associated with a lower incidence of catheter-related complications and improved QoL than PICCs.Optimal device selection,precise catheter tip positioning,and effective perioperative management are critical for minimizing complications and enhancing patient-reported outcomes during treatment.展开更多
BACKGROUND Hepatocellular carcinoma(HCC)is notorious for its aggressive progression and dismal prognosis,with chromatin accessibility dynamics emerging as pivotal yet poorly understood drivers.AIM To dissect how multi...BACKGROUND Hepatocellular carcinoma(HCC)is notorious for its aggressive progression and dismal prognosis,with chromatin accessibility dynamics emerging as pivotal yet poorly understood drivers.AIM To dissect how multilayered chromatin regulation sustains oncogenic transcription and tumor-stroma crosstalk in HCC,we combined multiomics single cell analysis.METHODS We integrated single-cell RNA sequencing and paired single-cell assay for transposase-accessible chromatin with sequencing data of HCC samples,complemented by bulk RNA sequencing validation across The Cancer Genome Atlas,Liver Cancer Institute,and GSE25907 cohorts.Cell type-specific chromatin architectures were resolved via ArchR,with regulatory hubs identified through peak-to-gene linkages and coaccessibility networks.Functional validation employed A485-mediated histone 3 lysine 27 acetylation suppression and small interfering RNA targeting DGAT1.RESULTS Malignant hepatocytes exhibited expanded chromatin accessibility profiles,characterized by increased numbers of accessible peaks and larger physical regions despite reduced peak intensity.Enhancer-like peaks enriched in malignant regulation,forming long-range hubs.Eighteen enhancer-like peak-related genes showed tumor-specific overexpression and diagnostic accuracy,correlating with poor prognosis.Intercellular coaccessibility analysis revealed tumor-stroma symbiosis via shared chromatin states.Pharmacological histone 3 lysine 27 acetylation inhibition paradoxically downregulated DGAT1,the hub gene most strongly regulated by chromatin accessibility.DGAT1 knockdown suppressed cell proliferation.CONCLUSION Multilayered chromatin reprogramming sustains HCC progression through tumor-stroma crosstalk and DGAT1-related oncogenic transcription,defining targetable epigenetic vulnerabilities.展开更多
The envisioned 6G wireless networks demand advanced Multiple Access (MA) schemes capable of supporting ultra-low latency, massive connectivity, high spectral efficiency, and energy efficiency (EE), especially as the c...The envisioned 6G wireless networks demand advanced Multiple Access (MA) schemes capable of supporting ultra-low latency, massive connectivity, high spectral efficiency, and energy efficiency (EE), especially as the current 5G networks have not achieved the promised 5G goals, including the projected 2000 times EE improvement over the legacy 4G Long Term Evolution (LTE) networks. This paper provides a comprehensive survey of Artificial Intelligence (AI)-enabled MA techniques, emphasizing their roles in Spectrum Sensing (SS), Dynamic Resource Allocation (DRA), user scheduling, interference mitigation, and protocol adaptation. In particular, we systematically analyze the progression of traditional and modern MA schemes, from Orthogonal Multiple Access (OMA)-based approaches like Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA) to advanced Non-Orthogonal Multiple Access (NOMA) methods, including power domain-NOMA, Sparse Code Multiple Access (SCMA), and Rate Splitting Multiple Access (RSMA). The study further categorizes AI techniques—such as Machine Learning (ML), Deep Learning (DL), Reinforcement Learning (RL), Federated Learning (FL), and Explainable AI (XAI)—and maps them to practical challenges in Dynamic Spectrum Management (DSM), protocol optimization, and real-time distributed decision-making. Optimization strategies, including metaheuristics and multi-agent learning frameworks, are reviewed to illustrate the potential of AI in enhancing energy efficiency, system responsiveness, and cross-layer RA. Additionally, the review addresses security, privacy, and trust concerns, highlighting solutions like privacy-preserving ML, FL, and XAI in 6G and beyond. By identifying research gaps, challenges, and future directions, this work offers a structured resource for researchers and practitioners aiming to integrate AI into 6G MA systems for intelligent, scalable, and secure wireless communications.展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)...Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)score,and SCImago Journal Rank(SJR)-and the journal ratings assigned by expert reviewers.We expect that the OA journals will have especially high citation impact relative to their perceived quality(reputation).Design/methodology/approach:Regression is used to estimate the ratings assigned by expert reviewers for the 2021 CABS(Chartered Association of Business Schools)journal assessment exercise.The independent variables are the four citation metrics,evaluated separately,and a dummy variable representing the OA/non-OA status of each journal.Findings:Regardless of the citation metric used,OA journals in business and economics have especially high citation impact relative to their perceived quality(reputation).That is,they have especially low perceived quality(reputation)relative to their citation impact.Research limitations:These results are specific to the CABS journal ratings and the four citation metrics.However,there is strong evidence that CABS is closely related to several other expert ratings,and that 5IF,CiteScore,AI,and SJR are representative of the other citation metrics that might have been chosen.Practical implications:There are at least two possible explanations for these results:(1)expert evaluators are biased against OA journals,and(2)OA journals have especially high citation impact due to their increased accessibility.Although this study does not allow us to determine which of these explanations are supported,the results suggest that authors should consider publishing in OA journals whenever overall readership and citation impact are more important than journal reputation within a particular field.Moreover,the OA coefficients provide a useful indicator of the extent to which anti-OA bias(or the citation advantage of OA journals)is diminishing over time.Originality/value:This is apparently the first study to investigate the impact of OA status on the relationships between expert journal ratings and journal citation metrics.展开更多
文摘In this paper,we propose a random access scheme termed sign-compute diversity slotted ALOHA(SCDSA).The SCDSA scheme combines diversity transmission with compute-and-forward.Without considering the capture effect and multiple user detection techniques,our scheme can reach a high throughput of 0.98 without feedback under finite frame size settings,where the upper bound on performance is 1.Moreover,a lower bound on throughput performance is derived,which is tight in some parameter settings and can be used to approximate theoretical performance.Simulation results validate our analysis and confirm the advantages of our proposed scheme.
文摘After securing a market for their dried red chilli peppers in China,elated farmers in Uganda are expanding the spicy crop cultivation to thousands of acres.China’s increasing appetite for international cuisine and spices has created a most welcome demand for high-quality chillies.And given Uganda’s unique climate and soil conditions that allow for diverse chilli varieties,the East African country has a competitive edge.This has led to Uganda and China now having trade agreements in place,facilitating exports.
基金supported by the National Science Foundation of China(No.62171387)the Science and Technology Program of Sichuan Province(No.2024NSFSC0468)the China Postdoctoral Science Foundation(No.2019M663475).
文摘As an important resource in data link,time slots should be strategically allocated to enhance transmission efficiency and resist eavesdropping,especially considering the tremendous increase in the number of nodes and diverse communication needs.It is crucial to design control sequences with robust randomness and conflict-freeness to properly address differentiated access control in data link.In this paper,we propose a hierarchical access control scheme based on control sequences to achieve high utilization of time slots and differentiated access control.A theoretical bound of the hierarchical control sequence set is derived to characterize the constraints on the parameters of the sequence set.Moreover,two classes of optimal hierarchical control sequence sets satisfying the theoretical bound are constructed,both of which enable the scheme to achieve maximum utilization of time slots.Compared with the fixed time slot allocation scheme,our scheme reduces the symbol error rate by up to 9%,which indicates a significant improvement in anti-interference and eavesdropping capabilities.
基金Under the auspices of the National Natural Science Foundation of China(No.42271224,41901193)Ministry of Edu cation Humanities and Social Sciences Research Planning Fund Project of China(No.24YJAZH190)+1 种基金Anhui Province Excellent Youth Research Project in Universities(No.2022AH030019)Anhui Social Sciences Innovation Development Research Project(No.2024CXQ503)。
文摘The accessibility of urban public transit directly influences residents’quality of life,travel behavior,and social equity.Its correlation with housing prices has garnered significant attention across disciplines such as geography,economics,and urban planning.Although much existing research focuses on the impact of individual transportation facilities on housing prices,there is a notable gap in comprehensive analyses that assess the influence of overall urban transit accessibility on housing market dynamics.This study selected the main urban area of Hefei,China,as a case to investigate the spatial distribution of housing prices and evaluate public transit accessibility in 2022.Employing techniques such as the optimized parameter geographical detector and local spatial regression models,the study aimed to elucidate the effects and underlying mechanisms of urban transit accessibility on housing prices.The findings revealed that:1)housing prices in Hefei exhibited a clustered spatial pattern,with high prices concentrated in the city center and lower prices in peripheral areas,forming three distinct high-price hotspots with a‘belt-like’distribution;2)public transit accessibility showed a‘coreperiphery’structure,with accessibility declining in a‘circumferential’pattern around the city center.Based on the‘housing price-accessibility’dimension,four categories were identified:high price-high accessibility(37.25%),high price-low accessibility(19.07%),low price-high accessibility(21.95%),and low price-low accessibility(21.73%);3)the impact of transit accessibility on housing prices was spatially heterogeneous,with bus travel showing the strongest explanatory power(0.692),followed by automobile,subway,and bicycle travel.The interaction of these transportation modes generated a synergistic effect on housing price differentiation,with most influencing factors contributing more than 25%.These findings offer valuable insights for optimizing the spatial distribution of public transit infrastructure and improving both urban housing quality and residents’living standards.
基金supported by the Canada Foundation for Innovation (Project#44220)the Natural Sciences and Engineering Research Council of Canada (RGPIN-2024-03986)+3 种基金the Michael Smith Foundation for Health Research BCthe financial support of Health Canada,through the Canada Brain Research Fund,an innovative partnership between the Government of Canada (through Health Canada),Brain Canada Foundationthe Azrieli Foundationsupported by a Canadian Institutes of Health Research (CIHR) Canada Graduate Scholarship–Master’s Award。
文摘Central nervous system(CNS) axons fail to regenerate following brain or spinal cord injury(SCI),which typically leads to permanent neurological deficits.Peripheral nervous system axons,howeve r,can regenerate following injury.Understanding the mechanisms that underlie this difference is key to developing treatments for CNS neurological diseases and injuries characterized by axonal damage.To initiate repair after peripheral nerve injury,dorsal root ganglion(DRG) neurons mobilize a pro-regenerative gene expression program,which facilitates axon outgrowth.
基金Under the auspices of Heilongjiang Provincial Natural Science Foundation of China(No.YQ2024D012),National Natural Science Foundation of China(No.42071162,42101165,42501220)。
文摘Under the background of‘the Belt and Road’and‘China-Mongolia-Russia Economic Corridor’initiatives,this paper studied the urban accessibility level,regional accessibility pattern and regional spatial effects along the Primorsky No.1 and No.2 transportation corridors.First,the evaluation of urban accessibility level with and without Primorsky No.1 and No.2 high-speed rails(HSRs)opening was conducted with two indicators,i.e.,the weighted average travel time,and the economic potential.After the evaluation,the spatial differentiation pattern of the accessibility changes with and without Primorsky No.1 and No.2 HSRs opening was performed respectively using ArcGIS.On these bases,the regional spatial effects brought by Primorsky No.1 and No.2 HSRs opening were studied.The results are as following.First,the urban accessibility level will be greatly improved by the opening of Primorsky No.1 and No.2 HSRs.All adjacent cities will be integrated into‘1 h HSR communication circle’and the whole journey will be integrated into‘4 h HSR communication circle’along Primorsky No.1 and No.2 corridors,respectively.The HSR accessibility of Primorsky No.1 corridor is stronger than that of Primorsky No.2 corridor.But the HSR accessibility improvement degree of Primorsky No.1 corridor is weaker than that of Primorsky No.2 corridor.Second,spatially,along Primorsky No.1 and No.2 corridors,the HSR accessibility level of the cities which are located in China is stronger than those cities located in Russia,showing the‘High West,Low East’patterns.The HSR accessibility improvement degree of the cities which are located in Russia and Sino-Russian border is stronger than those cities located in China,showing the‘High East,Low West’patterns.Third,Primorsky No.1 and No.2 corridors could connect the China’s‘Heilongjiang Land Sea Silk Road Economic Belt’and‘Changchun-Jilin-Tumen Development Pilot Zone’respectively,gradually involving into the development of China’s Harbin-Changchun Megalopolis.Relying on Harbin(China)and Changchun(China),Primorsky No.1 and No.2 HSRs could connect Northeast China-Beijing HSR,accelerating the diffusion of population,economy and other flows from China’s Beijing-Tianjin-Hebei Urban Agglomeration to Northeast China,and then to Russia’s Far East Federal District.Relying on Suifenhe(China)and Hunchun(China),Primorsky No.1 and No.2 HSRs could be conducive to the development of the second largest sea channels for Northeast China,creating the Northeast Asian Urban Belt,and new sea-rail intermodal pattern among China,Russia,Democratic People’s Republic of Korea,Japan and Republic of Korea.Relying on Vladivostok(Russia)and Zarubino(Russia),Primorsky No.1 and No.2 corridors could connect the‘Ice Silk Road’,building the‘Sino-Russian Northern Maritime Corridor’and‘Sino-Russian Arctic Blue Economic Areas’.
基金supported by the National Natural Science Foundation of China(62202215)Liaoning Province Applied Basic Research Program(Youth Special Project,2023JH2/101600038)+2 种基金Shenyang Youth Science and Technology Innovation Talent Support Program(RC220458)Guangxuan Program of Shenyang Ligong University(SYLUGXRC202216)Basic Research Special Funds for Undergraduate Universities in Liaoning Province(LJ212410144067).
文摘The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.
文摘Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets such as roles,specialties,or certifications.This data-centric cryptographic paradigm enables highly fine-grained,policydriven access control,minimizing the need for identity management and supporting scalable multi-user scenarios.This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade.It explores the evolution of these schemes,analyzing their design principles,strengths,limitations,and the level of granularity they offer in access control.The review also evaluates the security guarantees,efficiency,and practical applicability of these schemes in real-world healthcare environments.Furthermore,the paper outlines the current state of ABE as a mechanism for safeguarding EHR data and managing user access,while also identifying the key challenges that remain.Open issues such as scalability,revocation mechanisms,policy updates,and interoperability are discussed in detail,providing valuable insights for researchers and practitioners aiming to advance the secure management of health information systems.
基金supported in part by the National Natural Science Foundation of China under grants 61771255in part by the Provincial and Ministerial Key Laboratory Open Project under grant 20190904in part by the Key Technologies R&D Program of Jiangsu (Prospective and Key Technologies for Industry)under Grants BE2022067,BE2022067-1 and BE2022067-2。
文摘High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.
基金supported in part by Jiangsu Province High Level“333”Program (0401206044)National Natural Science Foundation of China (61801243,62072255)+4 种基金Program for Scientific Research Foundation for Talented Scholars of Jinling Institute of Technology (JIT-B-202031)University Incubator Foundation of Jinling Institute of Technology (JIT-FHXM-202110)Open Project of Fujian Provincial Key Lab.of Network Security and Cryptology (NSCL-KF2021-02)Open Foundation of National Railway Intelligence Transportation System Engineering Tech.Research Center (RITS2021KF02)China Postdoctoral Science Foundation (2019M651914)。
文摘The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach.
文摘BACKGROUND Central venous access is essential for administering chemotherapy in patients with gastrointestinal cancer.Peripherally inserted central catheters(PICC)and totally implantable venous access ports(TIVAP)are widely used,but comparative data regarding their impact on catheter-related complications and quality of life(QoL)remain limited.AIM To evaluate the impact of TIVAPs compared with PICC on catheter-related complications and QoL in patients with gastrointestinal cancer undergoing chemotherapy.METHODS This retrospective study included adults with gastrointestinal cancer who underwent central venous access device insertion for chemotherapy at our institution between December 2021 and December 2024.Inclusion criteria encompassed indications for intermittent intravenous chemotherapy,anticipated treatment duration of≥12 weeks,an adequate preoperative hematologic profile,accessible upper body veins,and complete medical records.Patients were excluded if they had an anticipated survival of less than three months,active systemic infection,severe thrombosis or coagulopathy,communication barriers,or an urgent need for dialysis access.Patients were assigned to either the PICC or TIVAP group based on device type.Data collected included demographic variables,cancer characteristics,insertion procedure details,complications,and QoL,assessed via the EuroQol 5-Dimensions-3 levels,visual analogue scale,and the European Organization for Research and Treatment of Cancer QoL Questionnaire-Core 30.RESULTS A total of 346 patients were analyzed.Baseline demographic,clinical,and cancer characteristics were similar between groups.The TIVAP group demonstrated a significantly lower incidence of catheter-related complications than the PICC group,with no pneumothorax occurring in either group.QoL assessments at baseline were comparable.At one month,the TIVAP group exhibited significantly higher EuroQoL Five Dimensions health state scores and QLQ-C30 global health status scores.Multivariate analysis identified TIVAP use,catheter tip placement in the distal superior vena cava/right atrium,prophylactic antibiotic administration,and antimicrobial dressing application as independent protective factors associated with reduced complications and improved QoL.CONCLUSION In patients with gastrointestinal cancer undergoing chemotherapy,TIVAPs are associated with a lower incidence of catheter-related complications and improved QoL than PICCs.Optimal device selection,precise catheter tip positioning,and effective perioperative management are critical for minimizing complications and enhancing patient-reported outcomes during treatment.
基金Supported by the Science and Technology Planning Project of Guangzhou,No.2024A03J0102the Natural Science Foundation of Guangdong Province for Distinguished Young Scholar,No.2022B1515020024+1 种基金National Natural Science Foundation of China,No.82070574the Key Research and Development Program of Guangzhou,No.2023B03J1298.
文摘BACKGROUND Hepatocellular carcinoma(HCC)is notorious for its aggressive progression and dismal prognosis,with chromatin accessibility dynamics emerging as pivotal yet poorly understood drivers.AIM To dissect how multilayered chromatin regulation sustains oncogenic transcription and tumor-stroma crosstalk in HCC,we combined multiomics single cell analysis.METHODS We integrated single-cell RNA sequencing and paired single-cell assay for transposase-accessible chromatin with sequencing data of HCC samples,complemented by bulk RNA sequencing validation across The Cancer Genome Atlas,Liver Cancer Institute,and GSE25907 cohorts.Cell type-specific chromatin architectures were resolved via ArchR,with regulatory hubs identified through peak-to-gene linkages and coaccessibility networks.Functional validation employed A485-mediated histone 3 lysine 27 acetylation suppression and small interfering RNA targeting DGAT1.RESULTS Malignant hepatocytes exhibited expanded chromatin accessibility profiles,characterized by increased numbers of accessible peaks and larger physical regions despite reduced peak intensity.Enhancer-like peaks enriched in malignant regulation,forming long-range hubs.Eighteen enhancer-like peak-related genes showed tumor-specific overexpression and diagnostic accuracy,correlating with poor prognosis.Intercellular coaccessibility analysis revealed tumor-stroma symbiosis via shared chromatin states.Pharmacological histone 3 lysine 27 acetylation inhibition paradoxically downregulated DGAT1,the hub gene most strongly regulated by chromatin accessibility.DGAT1 knockdown suppressed cell proliferation.CONCLUSION Multilayered chromatin reprogramming sustains HCC progression through tumor-stroma crosstalk and DGAT1-related oncogenic transcription,defining targetable epigenetic vulnerabilities.
文摘The envisioned 6G wireless networks demand advanced Multiple Access (MA) schemes capable of supporting ultra-low latency, massive connectivity, high spectral efficiency, and energy efficiency (EE), especially as the current 5G networks have not achieved the promised 5G goals, including the projected 2000 times EE improvement over the legacy 4G Long Term Evolution (LTE) networks. This paper provides a comprehensive survey of Artificial Intelligence (AI)-enabled MA techniques, emphasizing their roles in Spectrum Sensing (SS), Dynamic Resource Allocation (DRA), user scheduling, interference mitigation, and protocol adaptation. In particular, we systematically analyze the progression of traditional and modern MA schemes, from Orthogonal Multiple Access (OMA)-based approaches like Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA) to advanced Non-Orthogonal Multiple Access (NOMA) methods, including power domain-NOMA, Sparse Code Multiple Access (SCMA), and Rate Splitting Multiple Access (RSMA). The study further categorizes AI techniques—such as Machine Learning (ML), Deep Learning (DL), Reinforcement Learning (RL), Federated Learning (FL), and Explainable AI (XAI)—and maps them to practical challenges in Dynamic Spectrum Management (DSM), protocol optimization, and real-time distributed decision-making. Optimization strategies, including metaheuristics and multi-agent learning frameworks, are reviewed to illustrate the potential of AI in enhancing energy efficiency, system responsiveness, and cross-layer RA. Additionally, the review addresses security, privacy, and trust concerns, highlighting solutions like privacy-preserving ML, FL, and XAI in 6G and beyond. By identifying research gaps, challenges, and future directions, this work offers a structured resource for researchers and practitioners aiming to integrate AI into 6G MA systems for intelligent, scalable, and secure wireless communications.
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
文摘Purpose:For a set of 1,561 Open Access(OA)and non-OA journals in business and economics,this study evaluates the relationships between four citation metrics-five-year Impact Factor(5IF),CiteScore,Article Influence(AI)score,and SCImago Journal Rank(SJR)-and the journal ratings assigned by expert reviewers.We expect that the OA journals will have especially high citation impact relative to their perceived quality(reputation).Design/methodology/approach:Regression is used to estimate the ratings assigned by expert reviewers for the 2021 CABS(Chartered Association of Business Schools)journal assessment exercise.The independent variables are the four citation metrics,evaluated separately,and a dummy variable representing the OA/non-OA status of each journal.Findings:Regardless of the citation metric used,OA journals in business and economics have especially high citation impact relative to their perceived quality(reputation).That is,they have especially low perceived quality(reputation)relative to their citation impact.Research limitations:These results are specific to the CABS journal ratings and the four citation metrics.However,there is strong evidence that CABS is closely related to several other expert ratings,and that 5IF,CiteScore,AI,and SJR are representative of the other citation metrics that might have been chosen.Practical implications:There are at least two possible explanations for these results:(1)expert evaluators are biased against OA journals,and(2)OA journals have especially high citation impact due to their increased accessibility.Although this study does not allow us to determine which of these explanations are supported,the results suggest that authors should consider publishing in OA journals whenever overall readership and citation impact are more important than journal reputation within a particular field.Moreover,the OA coefficients provide a useful indicator of the extent to which anti-OA bias(or the citation advantage of OA journals)is diminishing over time.Originality/value:This is apparently the first study to investigate the impact of OA status on the relationships between expert journal ratings and journal citation metrics.