This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles o...This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.展开更多
The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional an...The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.展开更多
Pathological cardiac hypertrophy is an early and significant cardiac structural characteristic that contributes to the onset and progression of heart failure(HF).Its mainly structural feature is the abnormally enlarge...Pathological cardiac hypertrophy is an early and significant cardiac structural characteristic that contributes to the onset and progression of heart failure(HF).Its mainly structural feature is the abnormally enlarged cardiomyocyte.Effective intervention targets for abnormally enlarged cardiomyocyte remain to be identified.Previous studies have shown that the cellular shape and size can be regulated by the actin related protein 2/3(Arp2/3)complex,which is an actin-binding protein complex involved in the actin nucleation and assembly.However,the roles of the Arp2/3 complex in cardiomyocyte hypertrophy remain unknown.Here our study identifies its novel roles in the occurrence and development of cardiomyocyte hypertrophy.We found that mRNA levels of all subunits from the Arp2/3 complex are significantly upregulated(P<0.05)in the angiotensin Ⅱ(Ang Ⅱ)-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy.Further studies showed that siRNA-directed ARPC 2 silencing inhibits the reactivation of fetal genes and enlargement of cardiomyocyte area induced by Ang Ⅱ in neonatal rat primary cardiomyocytes(NRCMs)and H9c2 cells(P<0.05).In addition,the upstream activators of the Arp2/3 complex including SH3 protein interacting with Nck,90 kD(SPIN90)and Ras-related C3 botulinum toxin substrate 1(Rac1)/WASp family Verprolin-homologous protein-2(WAVE-2)are upregulated(P<0.05)in Ang Ⅱ-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy,indicating the excessive activation of the Arp2/3 complex.We further show that CK666,a specific Arp2/3 complex inhibitor,prevents the reactivation of fetal genes and the enlargement of cardiomyocyte area induced by Ang Ⅱ in NRCMs and H9c2 cells(P<0.05).Our results reveal that the Arp2/3 complex plays a crucial role in Ang Ⅱ-induced cardiomyocyte hypertrophy,which is beneficial to further studies about the molecular mechanisms by which the Arp2/3 complex regulates pathological cardiac hypertrophy.展开更多
As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM c...As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications.展开更多
Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the ...Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
文摘This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.
基金supported by the National Key Research and Development Program of China(Project No.2022YFB3104300).
文摘The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.
文摘Pathological cardiac hypertrophy is an early and significant cardiac structural characteristic that contributes to the onset and progression of heart failure(HF).Its mainly structural feature is the abnormally enlarged cardiomyocyte.Effective intervention targets for abnormally enlarged cardiomyocyte remain to be identified.Previous studies have shown that the cellular shape and size can be regulated by the actin related protein 2/3(Arp2/3)complex,which is an actin-binding protein complex involved in the actin nucleation and assembly.However,the roles of the Arp2/3 complex in cardiomyocyte hypertrophy remain unknown.Here our study identifies its novel roles in the occurrence and development of cardiomyocyte hypertrophy.We found that mRNA levels of all subunits from the Arp2/3 complex are significantly upregulated(P<0.05)in the angiotensin Ⅱ(Ang Ⅱ)-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy.Further studies showed that siRNA-directed ARPC 2 silencing inhibits the reactivation of fetal genes and enlargement of cardiomyocyte area induced by Ang Ⅱ in neonatal rat primary cardiomyocytes(NRCMs)and H9c2 cells(P<0.05).In addition,the upstream activators of the Arp2/3 complex including SH3 protein interacting with Nck,90 kD(SPIN90)and Ras-related C3 botulinum toxin substrate 1(Rac1)/WASp family Verprolin-homologous protein-2(WAVE-2)are upregulated(P<0.05)in Ang Ⅱ-induced neonatal rat primary and H9c2 cardiomyocyte hypertrophy,indicating the excessive activation of the Arp2/3 complex.We further show that CK666,a specific Arp2/3 complex inhibitor,prevents the reactivation of fetal genes and the enlargement of cardiomyocyte area induced by Ang Ⅱ in NRCMs and H9c2 cells(P<0.05).Our results reveal that the Arp2/3 complex plays a crucial role in Ang Ⅱ-induced cardiomyocyte hypertrophy,which is beneficial to further studies about the molecular mechanisms by which the Arp2/3 complex regulates pathological cardiac hypertrophy.
基金supported by the National Key Research&Development Projects of China(Grant No.2022YFA1204100)National Natural Science Foundation of China(Grant No.62488201)+1 种基金CAS Project for Young Scientists in Basic Research(YSBR-003)the Innovation Program of Quantum Science and Technology(2021ZD0302700)。
文摘As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications.
文摘Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.