The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto...The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.展开更多
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e...With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.展开更多
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to...Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.展开更多
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u...This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa...Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.展开更多
Conductive hydrogel-based stretchable electronics have been extensively investigated,among which strain sensors are the most prominently studied.While the mechanical properties significantly affect the performance of ...Conductive hydrogel-based stretchable electronics have been extensively investigated,among which strain sensors are the most prominently studied.While the mechanical properties significantly affect the performance of these devices,the systematic correlation between specific mechanical parameters and sensing performance remains rarely explored.This work compares the influences of Young’s modulus and mechanical hysteresis on the sensing performance between highly entangled PAM-Li and double-network PAM-Li-Agar-3 strain sensors.Owing to the brittle agar network,which imparts a higher Young’s modulus and pronounced mechanical hysteresis to the double-network PAMLi-Agar-3 hydrogel,the corresponding sensor requires a greater driving force for deformation and yields signals with poor reproducibility.In comparison,the PAM-Li hydrogel,characterized by highly entangled polymer chains,exhibits a lower Young’s modulus and negligible mechanical hysteresis.Consequently,signals from the PAM-Li strain sensor demonstrate enhanced sensitivity and stability.Therefore,this work demonstrates that a low Young’s modulus and minimal mechanical hysteresis are critical factors for achieving superior sensing performance in strain sensors,as systematically validated through comparative analyses across diverse application scenarios.展开更多
It is challenging to diagnose isolated hyperbilirubinemia with rare and complex etiologies under the constraints of traditional testing conditions.Herein,we present a rare case of coexisting Gilbert syndrome(GS)and er...It is challenging to diagnose isolated hyperbilirubinemia with rare and complex etiologies under the constraints of traditional testing conditions.Herein,we present a rare case of coexisting Gilbert syndrome(GS)and erythropoietic protoporphyria(EPP),which has not been previously documented.CASE SUMMARY We present a rare case of coexisting GS and EPP in a 23-year-old Chinese male with a long history of jaundice and recently found splenomegaly.Serial nonspecific hemolysis screening tests yielded inconsistent results,and investigations for common hemolytic etiologies were negative.However,Levitt’s carbon monoxide breath test,which measures erythrocyte lifespan(the gold-standard marker of hemolysis),demonstrated significant hemolysis,revealing a markedly shortened erythrocyte lifespan of 11 days(normal average 120 days).Genetic testing subsequently confirmed EPP with a homozygous ferrochelatase gene mutation and GS with a heterozygous uridine diphosphate glucuronosyl trans-ferase 1A1 gene mutation.CONCLUSION The rapid,non-invasive Levitt’s carbon monoxide breath test resolved the diagnostic challenge posed by a rare and complex cause of hyperbilirubinemia.展开更多
Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder and the leading cause of dementia worldwide.It is characterized by the accumulation of extracellular amyloid-beta(Aβ)plaques and intracellul...Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder and the leading cause of dementia worldwide.It is characterized by the accumulation of extracellular amyloid-beta(Aβ)plaques and intracellular tau neurofibrillary tangles,leading to synaptic dysfunction,neuronal loss,and cognitive decline.These pathological changes can begin decades before clinical symptoms emerge,highlighting the critical need for early,accessible,and accurate diagnostic tools.展开更多
针对触摸屏监控系统不能满足大中型立体仓库对数据进行存储和处理的功能需求,在Visual Studio 2019集成开发环境中,采用C#语言开发一套立体仓库上位机控制系统。以多线程的方式实时读取库位信息;以S7-1200 PLC作为主控制器,设计产品的...针对触摸屏监控系统不能满足大中型立体仓库对数据进行存储和处理的功能需求,在Visual Studio 2019集成开发环境中,采用C#语言开发一套立体仓库上位机控制系统。以多线程的方式实时读取库位信息;以S7-1200 PLC作为主控制器,设计产品的自动入库和自动出库程序流程,采用SCL语言设计了库位先进先出的控制程序。C#和S7-1200 PLC之间采用S7通信的方式控制立体仓库的出入库操作和库位信息采集,3年的现场运行情况表明,整个系统能在上位机上对立体仓库进行手动控制和自动控制,能精确快速地进行入库出库操作,运行平稳,上位机上能正确实时显示库位信息,达到了预期的结果。展开更多
食源性蛋白淀粉样纤维化聚集具有独特的结构特性,蚕豆11S蛋白(fava bean 11S protein,FP)作为一种可持续蛋白资源,表现出巨大的潜力。该研究探究了蚕豆11S蛋白淀粉样纤维化聚集(fibrotic aggregation of 11S protein in fava bean,FPF)...食源性蛋白淀粉样纤维化聚集具有独特的结构特性,蚕豆11S蛋白(fava bean 11S protein,FP)作为一种可持续蛋白资源,表现出巨大的潜力。该研究探究了蚕豆11S蛋白淀粉样纤维化聚集(fibrotic aggregation of 11S protein in fava bean,FPF)在形成过程中的动态演变,包括其结构表征和功能特性。6 g/100 mL的FP通过酸热处理(pH 2,85℃)不同时间(0~24 h)后得到FPF。处理后的样品通过硫黄素T、荧光、二酪氨酸、透射电子显微镜、傅里叶红外光谱等进行结构表征,结果表明FP先在酸热过程中水解成多肽,再自组装成富含β-折叠结构的FPF(由0 h的34.44%增加到24 h的45.89%)。通过起泡性、乳化性和凝胶特性等对FPF功能特性进行表征,与FP相比,反应24 h后的FPF具有更好的起泡性、乳化性和凝胶特性。此外,FPF在体外细胞实验中没有表现出细胞毒性。研究结果为FPF的形成规律提供了理论支撑。展开更多
基金supported by the Key Project of Science and Technology Research by Chongqing Education Commission under Grant KJZD-K202400610the Chongqing Natural Science Foundation General Project Grant CSTB2025NSCQ-GPX1263.
文摘The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols.
基金Supported by Zhoukou Key Science and Technology Research Project(20200816).
文摘With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production.
基金supported in part by National Natural Science Foundation of China(under Grant 61902163)the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks.
基金support from Research Council of Norway via STIPINST PhD grant(Grant No.323307),Bever Control AS,and Bane NOR.
文摘This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
基金funded by the National Key Research and Development Program of China(grant number 2023YFC2907600)the National Natural Science Foundation of China(grant number 52504132)Tiandi Science and Technology Co.,Ltd.Science and Technology Innovation Venture Capital Special Project(grant number 2023-TD-ZD011-004).
文摘Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness.
基金supported by the National Natural Science Foundation of China(52303145,52403083)the Natural Science Foundation of Sichuan Province(2025ZNSFSC1400)supported by the start-up funding at Chengdu University(T202207)。
文摘Conductive hydrogel-based stretchable electronics have been extensively investigated,among which strain sensors are the most prominently studied.While the mechanical properties significantly affect the performance of these devices,the systematic correlation between specific mechanical parameters and sensing performance remains rarely explored.This work compares the influences of Young’s modulus and mechanical hysteresis on the sensing performance between highly entangled PAM-Li and double-network PAM-Li-Agar-3 strain sensors.Owing to the brittle agar network,which imparts a higher Young’s modulus and pronounced mechanical hysteresis to the double-network PAMLi-Agar-3 hydrogel,the corresponding sensor requires a greater driving force for deformation and yields signals with poor reproducibility.In comparison,the PAM-Li hydrogel,characterized by highly entangled polymer chains,exhibits a lower Young’s modulus and negligible mechanical hysteresis.Consequently,signals from the PAM-Li strain sensor demonstrate enhanced sensitivity and stability.Therefore,this work demonstrates that a low Young’s modulus and minimal mechanical hysteresis are critical factors for achieving superior sensing performance in strain sensors,as systematically validated through comparative analyses across diverse application scenarios.
文摘It is challenging to diagnose isolated hyperbilirubinemia with rare and complex etiologies under the constraints of traditional testing conditions.Herein,we present a rare case of coexisting Gilbert syndrome(GS)and erythropoietic protoporphyria(EPP),which has not been previously documented.CASE SUMMARY We present a rare case of coexisting GS and EPP in a 23-year-old Chinese male with a long history of jaundice and recently found splenomegaly.Serial nonspecific hemolysis screening tests yielded inconsistent results,and investigations for common hemolytic etiologies were negative.However,Levitt’s carbon monoxide breath test,which measures erythrocyte lifespan(the gold-standard marker of hemolysis),demonstrated significant hemolysis,revealing a markedly shortened erythrocyte lifespan of 11 days(normal average 120 days).Genetic testing subsequently confirmed EPP with a homozygous ferrochelatase gene mutation and GS with a heterozygous uridine diphosphate glucuronosyl trans-ferase 1A1 gene mutation.CONCLUSION The rapid,non-invasive Levitt’s carbon monoxide breath test resolved the diagnostic challenge posed by a rare and complex cause of hyperbilirubinemia.
文摘Alzheimer’s disease(AD)is a complex,progressive neurodegenerative disorder and the leading cause of dementia worldwide.It is characterized by the accumulation of extracellular amyloid-beta(Aβ)plaques and intracellular tau neurofibrillary tangles,leading to synaptic dysfunction,neuronal loss,and cognitive decline.These pathological changes can begin decades before clinical symptoms emerge,highlighting the critical need for early,accessible,and accurate diagnostic tools.
文摘针对触摸屏监控系统不能满足大中型立体仓库对数据进行存储和处理的功能需求,在Visual Studio 2019集成开发环境中,采用C#语言开发一套立体仓库上位机控制系统。以多线程的方式实时读取库位信息;以S7-1200 PLC作为主控制器,设计产品的自动入库和自动出库程序流程,采用SCL语言设计了库位先进先出的控制程序。C#和S7-1200 PLC之间采用S7通信的方式控制立体仓库的出入库操作和库位信息采集,3年的现场运行情况表明,整个系统能在上位机上对立体仓库进行手动控制和自动控制,能精确快速地进行入库出库操作,运行平稳,上位机上能正确实时显示库位信息,达到了预期的结果。