On the occasion of the New Year,I would like to extend my sincere gratitude and New Year greetings to the experts,scholars,author teams,and readers who have long supported the development of Animal Models and Experime...On the occasion of the New Year,I would like to extend my sincere gratitude and New Year greetings to the experts,scholars,author teams,and readers who have long supported the development of Animal Models and Experimental Medicine(AMEM).Over the past year,we have faced challenges together and achieved breakthroughs in academic influence,internationalization,and fulfilling social respon-sibilities.Looking ahead,we are filled with confidence as we strive to build an important bridge connecting laboratory animal science and technology with academic research.展开更多
Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the ...Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.展开更多
This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles o...This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.展开更多
High-performance, large-area optical gratings for applications like chirped pulse amplification, gravitational wave astronomy, and X-ray optics require sub-nanometer line placement control over several cm^(2). Electro...High-performance, large-area optical gratings for applications like chirped pulse amplification, gravitational wave astronomy, and X-ray optics require sub-nanometer line placement control over several cm^(2). Electron beam lithography with a variable shaped beam(VSB) is well suited but limited by tool-dependent address grid discretization. We adapted address grid interpolation to the VSB method, reducing the effective placement grid to 25 pm, as confirmed by stray light measurements.展开更多
The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional an...The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.展开更多
Pathological cardiac hypertrophy is an early and significant cardiac structural characteristic that contributes to the onset and progression of heart failure(HF).Its mainly structural feature is the abnormally enlarge...Pathological cardiac hypertrophy is an early and significant cardiac structural characteristic that contributes to the onset and progression of heart failure(HF).Its mainly structural feature is the abnormally enlarged cardiomyocyte.Effective intervention targets for abnormally enlarged cardiomyocyte remain to be identified.Previous studies have shown that the cellular shape and size can be regulated by the actin related protein 2/3(Arp2/3)complex,which is an actin-binding protein complex involved in the actin nucleation and assembly.However,the roles of the Arp2/3 complex in cardiomyocyte hypertrophy remain unknown.Here our study identifies its novel roles in the occurrence and development of cardiomyocyte hypertrophy.We found that mRNA levels of all subunits from the Arp2/3 complex are significantly upregulated(P<0.05)in the angiotensin Ⅱ(Ang Ⅱ)-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy.Further studies showed that siRNA-directed ARPC 2 silencing inhibits the reactivation of fetal genes and enlargement of cardiomyocyte area induced by Ang Ⅱ in neonatal rat primary cardiomyocytes(NRCMs)and H9c2 cells(P<0.05).In addition,the upstream activators of the Arp2/3 complex including SH3 protein interacting with Nck,90 kD(SPIN90)and Ras-related C3 botulinum toxin substrate 1(Rac1)/WASp family Verprolin-homologous protein-2(WAVE-2)are upregulated(P<0.05)in Ang Ⅱ-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy,indicating the excessive activation of the Arp2/3 complex.We further show that CK666,a specific Arp2/3 complex inhibitor,prevents the reactivation of fetal genes and the enlargement of cardiomyocyte area induced by Ang Ⅱ in NRCMs and H9c2 cells(P<0.05).Our results reveal that the Arp2/3 complex plays a crucial role in Ang Ⅱ-induced cardiomyocyte hypertrophy,which is beneficial to further studies about the molecular mechanisms by which the Arp2/3 complex regulates pathological cardiac hypertrophy.展开更多
文摘On the occasion of the New Year,I would like to extend my sincere gratitude and New Year greetings to the experts,scholars,author teams,and readers who have long supported the development of Animal Models and Experimental Medicine(AMEM).Over the past year,we have faced challenges together and achieved breakthroughs in academic influence,internationalization,and fulfilling social respon-sibilities.Looking ahead,we are filled with confidence as we strive to build an important bridge connecting laboratory animal science and technology with academic research.
文摘Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.
文摘This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.
基金Bundesministerium für Bildung und Forschung(03Z1H534, 13N16028)Deutsche Forschungsgemeinschaft(448663633, 455425131)。
文摘High-performance, large-area optical gratings for applications like chirped pulse amplification, gravitational wave astronomy, and X-ray optics require sub-nanometer line placement control over several cm^(2). Electron beam lithography with a variable shaped beam(VSB) is well suited but limited by tool-dependent address grid discretization. We adapted address grid interpolation to the VSB method, reducing the effective placement grid to 25 pm, as confirmed by stray light measurements.
基金supported by the National Key Research and Development Program of China(Project No.2022YFB3104300).
文摘The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.
文摘Pathological cardiac hypertrophy is an early and significant cardiac structural characteristic that contributes to the onset and progression of heart failure(HF).Its mainly structural feature is the abnormally enlarged cardiomyocyte.Effective intervention targets for abnormally enlarged cardiomyocyte remain to be identified.Previous studies have shown that the cellular shape and size can be regulated by the actin related protein 2/3(Arp2/3)complex,which is an actin-binding protein complex involved in the actin nucleation and assembly.However,the roles of the Arp2/3 complex in cardiomyocyte hypertrophy remain unknown.Here our study identifies its novel roles in the occurrence and development of cardiomyocyte hypertrophy.We found that mRNA levels of all subunits from the Arp2/3 complex are significantly upregulated(P<0.05)in the angiotensin Ⅱ(Ang Ⅱ)-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy.Further studies showed that siRNA-directed ARPC 2 silencing inhibits the reactivation of fetal genes and enlargement of cardiomyocyte area induced by Ang Ⅱ in neonatal rat primary cardiomyocytes(NRCMs)and H9c2 cells(P<0.05).In addition,the upstream activators of the Arp2/3 complex including SH3 protein interacting with Nck,90 kD(SPIN90)and Ras-related C3 botulinum toxin substrate 1(Rac1)/WASp family Verprolin-homologous protein-2(WAVE-2)are upregulated(P<0.05)in Ang Ⅱ-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy,indicating the excessive activation of the Arp2/3 complex.We further show that CK666,a specific Arp2/3 complex inhibitor,prevents the reactivation of fetal genes and the enlargement of cardiomyocyte area induced by Ang Ⅱ in NRCMs and H9c2 cells(P<0.05).Our results reveal that the Arp2/3 complex plays a crucial role in Ang Ⅱ-induced cardiomyocyte hypertrophy,which is beneficial to further studies about the molecular mechanisms by which the Arp2/3 complex regulates pathological cardiac hypertrophy.