Pyridazine has garnered increasing attention as a privileged scaffold and bioisosterism in drug discovery due to its unique structural characteristics.It can serve as a hydrogen bond acceptor when interacting with rec...Pyridazine has garnered increasing attention as a privileged scaffold and bioisosterism in drug discovery due to its unique structural characteristics.It can serve as a hydrogen bond acceptor when interacting with receptors due to its two adjacent nitrogen atoms.Upon conversion to pyridazinone,it exhibits the ability to act as both a hydrogen bond acceptor and donor,showcasing its versatility.This inherent flexibility has prompted extensive research exploring its bioactivity in pesticides and pharmaceuticals.In order to promote the development of pyridazine-based pesticides,this review provides a comprehensive summary of advancements for pyridazine-based pesticides on herbicidal(36.9%),insecticidal(26.2%),antifungal and antibacterial(24.6%),plant growth regulatory(10.8%),and antiviral activities(1.5%)from2000 to 2024.It serves as an invaluable reference and source of inspiration for agricultural scientists conducting future research.展开更多
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo...Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.展开更多
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ...Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements.展开更多
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ...For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach.展开更多
The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-taile...The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-tailed image classification by rebalancing data,optimizing weights,and augmenting information.However,these methods often struggle to balance the performance between dominant and minority classes because of inadequate representation learning of the latter.To address these problems,we introduce descriptional words into images as cross-modal privileged information and propose a cross-modal enhanced method for long-tailed image classification,referred to as CMLTNet.CMLTNet improves the learning of intraclass similarity of tail-class representations by cross-modal alignment and captures the difference between the head and tail classes in semantic space by cross-modal inference.After fusing the above information,CMLTNet achieved an overall performance that was better than those of benchmark long-tailed and cross-modal learning methods on the long-tailed cross-modal datasets,NUS-WIDE and VireoFood-172.The effectiveness of the proposed modules was further studied through ablation experiments.In a case study of feature distribution,the proposed model was better in learning representations of tail classes,and in the experiments on model attention,CMLTNet has the potential to help learn some rare concepts in the tail class through mapping to the semantic space.展开更多
Cancer is a highly heterogeneous pathology that poses a significant threat to millions of lives worldwide.In recent decades,there has been a substantial advancement in our understanding of the mechanisms underlying on...Cancer is a highly heterogeneous pathology that poses a significant threat to millions of lives worldwide.In recent decades,there has been a substantial advancement in our understanding of the mechanisms underlying oncogenesis.Contemporary models now take into account the intricate interplay between cancer cells,immune cells,and other non-pathological cells during oncogenesis.The identification of small subpopulations of cancer stem cells has emerged as a crucial area of research,as these cells have been associated with cancer progression and resistance to various therapeutic interventions.The ability to distinguish between cancer stem cells and non-pathological stem cells is paramount for effective diagnostics and treatment.The stem state is associated with a cell’s ability to survive under harmful conditions.Evidence has recently emerged that non-pathological stem cells possess immune privileges.The ability of stem cells to evade surveillance of the immune system could be utilized by oncogenesis.This is of particular significance due to the rising role of anti-cancer immune therapies.Moreover,the immune privileges of stem cells could be exploited by cancer before any treatment,emphasizing the importance of their integration into cancer models.This review elucidates the functional comparison of cancer stem cells with non-pathological stem cells and the associated challenges in diagnostics and treatment.展开更多
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us...For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.展开更多
Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stali...Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stalinist slander.By Stalinism,I am referring to the narrative which was born from the bureaucratic degeneration of the Soviet Union,after the failure of working class to consolidate and capture state power in Hungary,Germany,Italy and other western countries which was materially in an advanced position than early 20th Century Russia.It was also the political ideology which was born as a result of civil far,famine,pandemic and the invasion of the newly formed Russian worker's state by more than fifteen foreign countries with colonial objectives.Trotsky's role in creating the Red Army,which was a different to that of a standing army and supporters of Trotsky in the Left Opposition were not only vilified and charged with false accusations but violently purged.In this paper I have highlighted how Stalinism marked a revolution against the revolution of 1917 and how Trotsky continuously struggled against the bureaucratic despotism over the working class in post 1917 Russia.展开更多
This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white...This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white.They both try to pass to the privileged identity(White for Clare;Black for Birdie)and they suffer and struggle on the edge of the color line.The author believes that these two characters are victims of the society divided by race.For people with biracial identity,their experience of having to adopt the privileged identity and giving up who they really are can be extremely painful.展开更多
Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly stee...Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly steeper learning curve than that for other standard gastrointestinal(GI) endoscopies, such as esophagogastroduodenoscopy or colonoscopy, due to greater technical difficulty and higher risk of complications. Yet, GI fellows have limited exposure to ERCP during standard-three-year-GI-fellowships because ERCP is much less frequently performed than esophagogastroduodenoscopy/colonoscopy. This led to adding an optional year of training in therapeutic endoscopy. Yet many graduates from standard three-year-fellowships without advanced training intensely pursue independent/unsupervised ERCP privileges despite inadequate numbers of performed ERCPs and unacceptably low rates of successful selective cannulation of desired(biliary or pancreatic) duct. Hospital credentialing committees have traditionally performed ERCP credentialing, but this practice has led to widespread flouting of recommended guidelines(e.g., planned privileging of applicant with 20% successful cannulation rate, or after performing only 7 ERCPs);and intense politicking of committee members by applicants, their practice groups, and potential competitors. Consequently, some gastroenterologists upon completing standard fellowships train and learn ERCP 'on the job' during independent/unsupervised practice, which can result in bad outcomes: high rates of failed bile duct cannulation. This severe clinical problem is indicated by publication of ≥ 12 ERCP competency studies/guidelines during last 5 years. However, lack of mandatory, quantitative, ERCP credentialing criteria has permitted neglect of recommended guidelines. This work comprehensively reviews literature on ERCP credentialing;reviews rationales for proposed guidelines;reports problems with current system;and proposes novel criteria for competency. This work advocates for mandatory, national, written,minimum, quantitative, standards, including cognitive skills(possibly assessed by a nationwide examination), and technical skills, assessed by number performed(≥ 200-250 ERCPs), types of ERCPs, success rate(approximately ≥ 90%cannulation of desired duct), and letters of recommendation by program director/ERCP mentor. Mandatory criteria should ideally not be monitored by a hospital committee subjected to intense politicking by applicants, their employers, and sometimes even competitors, but an independent national entity,like the National Board of Medical Examiners/American Board of Internal Medicine.展开更多
AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninet...AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes.展开更多
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat...The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools.展开更多
A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusi...A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of...This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system.展开更多
Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the ex...Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells.展开更多
To investigate the effect of ureaplasma urealyticum (UU) on the expression of Fas ligand (FasL) on rat Sertoli cell Materials & Method Isolated rat Sertoli cells were infected by living UU, UU super- natants, inac...To investigate the effect of ureaplasma urealyticum (UU) on the expression of Fas ligand (FasL) on rat Sertoli cell Materials & Method Isolated rat Sertoli cells were infected by living UU, UU super- natants, inactivated UU, then Fluorescence Activated Cell Sorter and observed fluores- cence microscopy were used to assay for the FasL expression on the surface of Sertoli cells. Results UU infection could increase the expression of FasL in Sertoli cell. Conclusion The functional expression of FasL is related to the immune privilege and can give the immune regulation on the testis.展开更多
The role of endoscopic retrograde cholangiopancreatography(ERCP) has dramatically changed in the last years, mainly into that of a therapeutic procedure. The treatment of benign biliary disease, like "difficult&q...The role of endoscopic retrograde cholangiopancreatography(ERCP) has dramatically changed in the last years, mainly into that of a therapeutic procedure. The treatment of benign biliary disease, like "difficult"choledocolithiasis, with endoscopic papillary large balloon dilation combined with endoscopic sphinterotomy has proven an effective and safe technique.Moreover, safety in ERCP has improved as well, with the prevention of postERCP pancreatitis and patient-to-patient transmission of infections. The advent of self-expandable metal stenting has radically changed the management of biliopancreatic malignant strictures, while the role for therapy of benign strictures is still controversial. In addition, cholangioscopy(though the direct visualization of the biliopancreatic ductal system) has allowed for characterization of indeterminate biliary strictures and facilitated rescue therapy of large biliary stones deemed removable. Encouraging data from tissue ablation techniques, such as photodynamic therapy and radiofrequency ablation, need to be confirmed by large sample size clinical controlled trials. On the other hand, we have no drug-coated stents yet available to implant and evidence for the use of biodegradable stents is still weak. The competency and privileging of ERCP and endoscopic ultrasonography have been analyzed longer but the switch between the two procedures, at the same time, is becoming ordinary; as such, the endoscopist interested in this field should undergo parallel edification through training plans. Finally, the American Society for Gastrointestinal Endoscopy's statement on non-anesthesiologist administration of propofol for gastrointestinal endoscopy is not actually endorsed by the European Society of Anaesthesiology,having many medical-legal implications in some European countries.展开更多
In order to enhance the security of Android applications, we propose a repackaging and dynamic authority management scheme based on Android application reinforcement methods Instead of using root privileges and system...In order to enhance the security of Android applications, we propose a repackaging and dynamic authority management scheme based on Android application reinforcement methods Instead of using root privileges and system modification, we introduce a user-level sandbox, which utilizes the native C-level interception mechanism, to further reinforce the risk applications and improve the entire security of Android system. Additionally, by importing and improving the repackaging features, this proposed scheme reduces the potential risks of applications and achieves the goal of the dynamic monitoring of permissions. Finally, a comprehensive evaluation, including efficiency analysis and detection evaluation with 1 000 malwares, whose overall average success rate is about 96%, shows the feasibility and univer- sality of the proposed scheme.展开更多
基金the financial support from the National Key Research and Development Program of China(No.2021YFD1700102)the National Natural Science Foundation of China(No.32472608)+3 种基金the Guizhou Provincial Fundation for Excellent Scholars Program(No.GCC[2023]069)the Central Government Guides Local Science and Technology Development Fund Projects(No.Qiankehezhongyindi[2024]007)the Guizhou Province Program of Major Scientific and Technological(No.Qiankehechengguo[2024]zhongda007)the Central Government Guides Local Science and Technology Development Fund Projects(No.Qiankehezhongyindi(2023)001)。
文摘Pyridazine has garnered increasing attention as a privileged scaffold and bioisosterism in drug discovery due to its unique structural characteristics.It can serve as a hydrogen bond acceptor when interacting with receptors due to its two adjacent nitrogen atoms.Upon conversion to pyridazinone,it exhibits the ability to act as both a hydrogen bond acceptor and donor,showcasing its versatility.This inherent flexibility has prompted extensive research exploring its bioactivity in pesticides and pharmaceuticals.In order to promote the development of pyridazine-based pesticides,this review provides a comprehensive summary of advancements for pyridazine-based pesticides on herbicidal(36.9%),insecticidal(26.2%),antifungal and antibacterial(24.6%),plant growth regulatory(10.8%),and antiviral activities(1.5%)from2000 to 2024.It serves as an invaluable reference and source of inspiration for agricultural scientists conducting future research.
基金the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No.R-2021-150.
文摘Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.
文摘Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements.
基金This paper was supported by the National Natural Sci- ence Foundation of China (Gront Nos. 61175037, 6122831M), US Natural Science Foundation CNS-1205664, Special Innovation Project on Speech of Anhui Province (11010202192), Project from Anhui Science and Technol- ogy Agency (1106c0805008) and Youth Creative Project of University of Science and Technology of China.
文摘For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach.
基金supported in part by the National Natural Science Foundation of China(62006141)the National Key R&D Program of China(2021YFC3300203)+1 种基金the Overseas Innovation Team Project of the“20 Regulations for New Universities”Funding Program of Jinan(2021GXRC073)the Excellent Youth Scholars Program of Shandong Province(2022HWYQ-048).
文摘The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes,neglecting the less frequent ones.Current approaches address the issues in long-tailed image classification by rebalancing data,optimizing weights,and augmenting information.However,these methods often struggle to balance the performance between dominant and minority classes because of inadequate representation learning of the latter.To address these problems,we introduce descriptional words into images as cross-modal privileged information and propose a cross-modal enhanced method for long-tailed image classification,referred to as CMLTNet.CMLTNet improves the learning of intraclass similarity of tail-class representations by cross-modal alignment and captures the difference between the head and tail classes in semantic space by cross-modal inference.After fusing the above information,CMLTNet achieved an overall performance that was better than those of benchmark long-tailed and cross-modal learning methods on the long-tailed cross-modal datasets,NUS-WIDE and VireoFood-172.The effectiveness of the proposed modules was further studied through ablation experiments.In a case study of feature distribution,the proposed model was better in learning representations of tail classes,and in the experiments on model attention,CMLTNet has the potential to help learn some rare concepts in the tail class through mapping to the semantic space.
文摘Cancer is a highly heterogeneous pathology that poses a significant threat to millions of lives worldwide.In recent decades,there has been a substantial advancement in our understanding of the mechanisms underlying oncogenesis.Contemporary models now take into account the intricate interplay between cancer cells,immune cells,and other non-pathological cells during oncogenesis.The identification of small subpopulations of cancer stem cells has emerged as a crucial area of research,as these cells have been associated with cancer progression and resistance to various therapeutic interventions.The ability to distinguish between cancer stem cells and non-pathological stem cells is paramount for effective diagnostics and treatment.The stem state is associated with a cell’s ability to survive under harmful conditions.Evidence has recently emerged that non-pathological stem cells possess immune privileges.The ability of stem cells to evade surveillance of the immune system could be utilized by oncogenesis.This is of particular significance due to the rising role of anti-cancer immune therapies.Moreover,the immune privileges of stem cells could be exploited by cancer before any treatment,emphasizing the importance of their integration into cancer models.This review elucidates the functional comparison of cancer stem cells with non-pathological stem cells and the associated challenges in diagnostics and treatment.
文摘For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.
文摘Leon Trotsky's contribution to the Marxist position in philosophy and his role in the Russian Revolution of October 1917 had been politically maneuvered,tampered with,fabricated and covered by a muck heap of Stalinist slander.By Stalinism,I am referring to the narrative which was born from the bureaucratic degeneration of the Soviet Union,after the failure of working class to consolidate and capture state power in Hungary,Germany,Italy and other western countries which was materially in an advanced position than early 20th Century Russia.It was also the political ideology which was born as a result of civil far,famine,pandemic and the invasion of the newly formed Russian worker's state by more than fifteen foreign countries with colonial objectives.Trotsky's role in creating the Red Army,which was a different to that of a standing army and supporters of Trotsky in the Left Opposition were not only vilified and charged with false accusations but violently purged.In this paper I have highlighted how Stalinism marked a revolution against the revolution of 1917 and how Trotsky continuously struggled against the bureaucratic despotism over the working class in post 1917 Russia.
文摘This article aims at comparing and contrasting the passing experience of Clare in Larsen Nella’s Quicksand and Passing and Birdie in Danzy Senna's Caucasia.These two characters both have light skin and look white.They both try to pass to the privileged identity(White for Clare;Black for Birdie)and they suffer and struggle on the edge of the color line.The author believes that these two characters are victims of the society divided by race.For people with biracial identity,their experience of having to adopt the privileged identity and giving up who they really are can be extremely painful.
文摘Endoscopic-retrograde-cholangiopancreatography(ERCP) is now a vital modality with primarily therapeutic and occasionally solely diagnostic utility for numerous biliary/pancreatic disorders. It has a significantly steeper learning curve than that for other standard gastrointestinal(GI) endoscopies, such as esophagogastroduodenoscopy or colonoscopy, due to greater technical difficulty and higher risk of complications. Yet, GI fellows have limited exposure to ERCP during standard-three-year-GI-fellowships because ERCP is much less frequently performed than esophagogastroduodenoscopy/colonoscopy. This led to adding an optional year of training in therapeutic endoscopy. Yet many graduates from standard three-year-fellowships without advanced training intensely pursue independent/unsupervised ERCP privileges despite inadequate numbers of performed ERCPs and unacceptably low rates of successful selective cannulation of desired(biliary or pancreatic) duct. Hospital credentialing committees have traditionally performed ERCP credentialing, but this practice has led to widespread flouting of recommended guidelines(e.g., planned privileging of applicant with 20% successful cannulation rate, or after performing only 7 ERCPs);and intense politicking of committee members by applicants, their practice groups, and potential competitors. Consequently, some gastroenterologists upon completing standard fellowships train and learn ERCP 'on the job' during independent/unsupervised practice, which can result in bad outcomes: high rates of failed bile duct cannulation. This severe clinical problem is indicated by publication of ≥ 12 ERCP competency studies/guidelines during last 5 years. However, lack of mandatory, quantitative, ERCP credentialing criteria has permitted neglect of recommended guidelines. This work comprehensively reviews literature on ERCP credentialing;reviews rationales for proposed guidelines;reports problems with current system;and proposes novel criteria for competency. This work advocates for mandatory, national, written,minimum, quantitative, standards, including cognitive skills(possibly assessed by a nationwide examination), and technical skills, assessed by number performed(≥ 200-250 ERCPs), types of ERCPs, success rate(approximately ≥ 90%cannulation of desired duct), and letters of recommendation by program director/ERCP mentor. Mandatory criteria should ideally not be monitored by a hospital committee subjected to intense politicking by applicants, their employers, and sometimes even competitors, but an independent national entity,like the National Board of Medical Examiners/American Board of Internal Medicine.
基金Supported by the National Natural Science Foundation of China,No.39900143
文摘AIM: To detect the expression of Fas ligand (FasL) in colon cancer tissues and cell lines and analyze the function of FasL-expressing colon cancer cells in inducing Fas-sensitive T lymphocyte apoptosis. METHODS: Ninety surgically resected colon cancer tissues and 15 hepatic metastasis specimens were investigatedby immunohistochemical method with normal colon mucosa and colon adenoma as control. The relationship between FasL expression and pathologic features was also analyzed.FasL expression of 4 colon cancer cell lines, SW620, Lovo, LS-174T and SW1116, were detected by Western blotting assay. The function of FasL expressed on colon cancer cells was determined by coculture assay with Jurkat T lymphocytes, the apoptotic rate of which was detectedby flow cytometry assay.RESULTS: Fifty-six (62.22%) cases of all the 90 colon cancer tissues and all (100%) the liver metastasis specimens expressed FasL, significantly higher than normal colon mucosa and colonic adenoma. Higher expression of FasL was found in more advanced stage of colon cancer and in cancer tissues with lymphatic or hepatic metastasis.All the colon cancer cell lines were found to express FasL.After coculture with the SW1116 cells for 24 h with an effector: target ratio 10:1, the rate of apoptosis of Jurkat cells rose from 1.9% to 21.0%.CONCLUSION: The expression of FasL is upregulated in colon cancer and the functionally expressed FasL can induce apoptosis of Fas-expressing T lymphocytes.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools.
文摘A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.
文摘This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system.
基金This study was supported by Shanghai Education Committee Science and Research Funds (04BB21)
文摘Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells.
基金Granted by National Natural Science Fundation of China (39970283)
文摘To investigate the effect of ureaplasma urealyticum (UU) on the expression of Fas ligand (FasL) on rat Sertoli cell Materials & Method Isolated rat Sertoli cells were infected by living UU, UU super- natants, inactivated UU, then Fluorescence Activated Cell Sorter and observed fluores- cence microscopy were used to assay for the FasL expression on the surface of Sertoli cells. Results UU infection could increase the expression of FasL in Sertoli cell. Conclusion The functional expression of FasL is related to the immune privilege and can give the immune regulation on the testis.
文摘The role of endoscopic retrograde cholangiopancreatography(ERCP) has dramatically changed in the last years, mainly into that of a therapeutic procedure. The treatment of benign biliary disease, like "difficult"choledocolithiasis, with endoscopic papillary large balloon dilation combined with endoscopic sphinterotomy has proven an effective and safe technique.Moreover, safety in ERCP has improved as well, with the prevention of postERCP pancreatitis and patient-to-patient transmission of infections. The advent of self-expandable metal stenting has radically changed the management of biliopancreatic malignant strictures, while the role for therapy of benign strictures is still controversial. In addition, cholangioscopy(though the direct visualization of the biliopancreatic ductal system) has allowed for characterization of indeterminate biliary strictures and facilitated rescue therapy of large biliary stones deemed removable. Encouraging data from tissue ablation techniques, such as photodynamic therapy and radiofrequency ablation, need to be confirmed by large sample size clinical controlled trials. On the other hand, we have no drug-coated stents yet available to implant and evidence for the use of biodegradable stents is still weak. The competency and privileging of ERCP and endoscopic ultrasonography have been analyzed longer but the switch between the two procedures, at the same time, is becoming ordinary; as such, the endoscopist interested in this field should undergo parallel edification through training plans. Finally, the American Society for Gastrointestinal Endoscopy's statement on non-anesthesiologist administration of propofol for gastrointestinal endoscopy is not actually endorsed by the European Society of Anaesthesiology,having many medical-legal implications in some European countries.
基金Supported by the National Natural Science Foundation of China(61303212,61332019,U1135004)the Hubei Provincial Natural Science Foundation of China(2014CFB192)the Fundamental Research Founds for National University,China University of Geosciences(Wuhan)(CUGL130234)
文摘In order to enhance the security of Android applications, we propose a repackaging and dynamic authority management scheme based on Android application reinforcement methods Instead of using root privileges and system modification, we introduce a user-level sandbox, which utilizes the native C-level interception mechanism, to further reinforce the risk applications and improve the entire security of Android system. Additionally, by importing and improving the repackaging features, this proposed scheme reduces the potential risks of applications and achieves the goal of the dynamic monitoring of permissions. Finally, a comprehensive evaluation, including efficiency analysis and detection evaluation with 1 000 malwares, whose overall average success rate is about 96%, shows the feasibility and univer- sality of the proposed scheme.