[Objective] To evaluate the control effect of yellow sticky cards and sex pheromone on Plutella xylostella and Liriomyza spp.,which can provide reference for large area extension of the technique.[Method] The integrat...[Objective] To evaluate the control effect of yellow sticky cards and sex pheromone on Plutella xylostella and Liriomyza spp.,which can provide reference for large area extension of the technique.[Method] The integrated assessment of trapping efficiency of colored sticky cards and sex pheromone on Liriomyza spp.and Plutella xylostella was conducted by field surveys and structured interview in Tonghai County,Yunnan Province,China.[Result] The results showed that yellow sticky cards and sex pheromone have strong power of trapping Liriomyza spp.and Plutella xylostella(3 414±720 and(219±157) head/piece,respectively);the control cost by the usage of pesticide is the highest,(10 099.5±2 752.5) yuan/hm^2,yellow sticky cards and sex pheromone takes the second place,(1 125.0±465.0) yuan/hm^2,the control cost by the usage of yellow sticky cards is the lowest,(450.0 ±186.0)yuan/hm^2.Without the usage of yellow sticky cards and sex pheromone,pesticide application times and costs are(15.0±2.7) times and(12 070.5±2 136.0) yuan/hm^2;combined with usage of yellow sticky cards and sex pheromone,pesticide application times and costs reduce by 5.7 times and 4 618.5 yuan/hm^2.The ratio of trapped beneficial insects and target pests was 1 ∶1 131,which showed that the negative effect of yellow sticky cards and sex pheromone on the non-target insects was very limited.[Conclusion] The trapping approach has become popular among all the local farmers.Looking at the above factors,the trapping technology has strong application prospect and promotion value in pest control field.展开更多
Microglia are the first immune cells that are activated in the brain following ischemic stroke.Mitochondrial dysfunction exacerbates microglia-mediated neuroinflammation post-stroke.Caspase activation and recruitment ...Microglia are the first immune cells that are activated in the brain following ischemic stroke.Mitochondrial dysfunction exacerbates microglia-mediated neuroinflammation post-stroke.Caspase activation and recruitment domain 19(CARD19)is involved in innate immune response and inflammatory response,which are also important functions of microglia.However,the role of CARD19 in microglial biology and ischemic stroke remains unknown.Here,we observed that CARD19 expression was significantly elevated in microglia in the penumbra after ischemic stroke via analyzing the spatial transcriptomic sequencing data of ischemic brain tissue,as well as in an in vitro model of microglial activation.Remarkably,conditional knockdown of Card19 in microglia promoted post-stroke neuroinflammation and worsened neurological outcomes in a mouse model of ischemic stroke.Mechanistically,we found that CARD19 localized to mitochondria and promoted the assembly of mitochondrial intermembrane bridge components,while CARD19 deficiency in microglia caused ultrastructural and functional damage to the mitochondrial cristae,leading to an exaggerated pro-inflammatory response.Thus,our findings suggest that preserving mitochondrial cristae,by targeting CARD19 could be a novel therapeutic strategy for ameliorating neuroinflammation post-stroke and decreasing the volume of the ischemic penumbra.展开更多
Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequen...Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios.展开更多
Every December,millions of Christmas cards go through the post offices.There're pictures of stars, snow or Christmas tree on the cards. In these days it's hard to think of a Christmas without cards,yet
In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the abov...In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.展开更多
With the development of the Internet of Things(IoT)technique,sensitive information collected by sensors may be leaked.In recent years,many authentication schemes have been proposed.Banerjee et al proposed a biometric ...With the development of the Internet of Things(IoT)technique,sensitive information collected by sensors may be leaked.In recent years,many authentication schemes have been proposed.Banerjee et al proposed a biometric based user authentication scheme in wireless sensor networks using smart cards in 2019.But we found that Banerjee et al's authentication scheme is vulnerable to impersonation attacks.In order to overcome the weaknesses of Banerjee et al's scheme,we propose a new authentication scheme.In our proposed scheme,we only use the exclusive-or operation and one-way Hash function for the efficiency,which can reduce the computation burden for the IoT devices.In the authentication and session key agreement phase,the secret registration parameter is not used for the authentication,and the session key is given for the all entities.In the Devol-Yao threat model,the security analysis demonstrates that our proposed authentication scheme can resist well-known attacks.展开更多
基金Supported by Development Program of Misereor Foundation of Germany(335-0311028Z)~~
文摘[Objective] To evaluate the control effect of yellow sticky cards and sex pheromone on Plutella xylostella and Liriomyza spp.,which can provide reference for large area extension of the technique.[Method] The integrated assessment of trapping efficiency of colored sticky cards and sex pheromone on Liriomyza spp.and Plutella xylostella was conducted by field surveys and structured interview in Tonghai County,Yunnan Province,China.[Result] The results showed that yellow sticky cards and sex pheromone have strong power of trapping Liriomyza spp.and Plutella xylostella(3 414±720 and(219±157) head/piece,respectively);the control cost by the usage of pesticide is the highest,(10 099.5±2 752.5) yuan/hm^2,yellow sticky cards and sex pheromone takes the second place,(1 125.0±465.0) yuan/hm^2,the control cost by the usage of yellow sticky cards is the lowest,(450.0 ±186.0)yuan/hm^2.Without the usage of yellow sticky cards and sex pheromone,pesticide application times and costs are(15.0±2.7) times and(12 070.5±2 136.0) yuan/hm^2;combined with usage of yellow sticky cards and sex pheromone,pesticide application times and costs reduce by 5.7 times and 4 618.5 yuan/hm^2.The ratio of trapped beneficial insects and target pests was 1 ∶1 131,which showed that the negative effect of yellow sticky cards and sex pheromone on the non-target insects was very limited.[Conclusion] The trapping approach has become popular among all the local farmers.Looking at the above factors,the trapping technology has strong application prospect and promotion value in pest control field.
基金National Natural Science Foundation of China,Nos.81920108017(to YX),82401546(to HL)Jiangsu Province Key Medical Discipline,No.ZDXK202216(to YX)the Key Research and Development Program of Jiangsu Province of China,No.BE2020620(to YX).
文摘Microglia are the first immune cells that are activated in the brain following ischemic stroke.Mitochondrial dysfunction exacerbates microglia-mediated neuroinflammation post-stroke.Caspase activation and recruitment domain 19(CARD19)is involved in innate immune response and inflammatory response,which are also important functions of microglia.However,the role of CARD19 in microglial biology and ischemic stroke remains unknown.Here,we observed that CARD19 expression was significantly elevated in microglia in the penumbra after ischemic stroke via analyzing the spatial transcriptomic sequencing data of ischemic brain tissue,as well as in an in vitro model of microglial activation.Remarkably,conditional knockdown of Card19 in microglia promoted post-stroke neuroinflammation and worsened neurological outcomes in a mouse model of ischemic stroke.Mechanistically,we found that CARD19 localized to mitochondria and promoted the assembly of mitochondrial intermembrane bridge components,while CARD19 deficiency in microglia caused ultrastructural and functional damage to the mitochondrial cristae,leading to an exaggerated pro-inflammatory response.Thus,our findings suggest that preserving mitochondrial cristae,by targeting CARD19 could be a novel therapeutic strategy for ameliorating neuroinflammation post-stroke and decreasing the volume of the ischemic penumbra.
基金supported by the National Research Foundation of Korea(NRF)funded by the Korea government(RS-2023-00249743)Additionally,this research was supported by the Global-Learning&Academic Research Institution for Master’s,PhD Students,and Postdocs(LAMP)Program of the National Research Foundation of Korea(NRF)grant funded by the Ministry of Education(RS-2024-00443714)This research was also supported by the“Research Base Construction Fund Support Program”funded by Jeonbuk National University in 2025.
文摘Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships,as in Euclidean data such as time series or image grids.However,real-world data frequently involve irregular,interconnected structures,requiring a shift toward non-Euclidean approaches.This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals.By leveraging graph convolution filters,we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods.Utilizing the Graph Convolutional Networks(GCN)framework,we integrate graph-based embeddings with conventional anomaly detection models,enhancing performance through relational insights.Ourmethod is validated on European credit card transaction data,demonstrating its effectiveness in detecting fraudulent transactions,particularly thosewith subtle patterns that evade traditional,amountbased detection techniques.The results highlight the advantages of incorporating temporal and structural dependencies into fraud detection,showcasing the robustness and applicability of our approach in complex,real-world scenarios.
文摘Every December,millions of Christmas cards go through the post offices.There're pictures of stars, snow or Christmas tree on the cards. In these days it's hard to think of a Christmas without cards,yet
基金the National Natural Science Foundation of China (10671051)the Natural Science Foundation of Zhejiang Province (103060)
文摘In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)。
文摘With the development of the Internet of Things(IoT)technique,sensitive information collected by sensors may be leaked.In recent years,many authentication schemes have been proposed.Banerjee et al proposed a biometric based user authentication scheme in wireless sensor networks using smart cards in 2019.But we found that Banerjee et al's authentication scheme is vulnerable to impersonation attacks.In order to overcome the weaknesses of Banerjee et al's scheme,we propose a new authentication scheme.In our proposed scheme,we only use the exclusive-or operation and one-way Hash function for the efficiency,which can reduce the computation burden for the IoT devices.In the authentication and session key agreement phase,the secret registration parameter is not used for the authentication,and the session key is given for the all entities.In the Devol-Yao threat model,the security analysis demonstrates that our proposed authentication scheme can resist well-known attacks.