The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mong...The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mongolian low vortex is the main weather system that triggers snowstorms,and can be classified into three types:small trough development,horizontal trough becoming vertical,and low trough moving eastwards.Snowstorms pose a relatively serious threat to agricultural and animal husbandry production,transportation,power and communication in Tongliao.Especially in spring,snowstorm weather poses a greater threat to agriculture and animal husbandry in Tongliao.It is needed to pay attention to the impact of extreme weather and climate events such as snowstorms,strengthen research on the mechanisms of disaster-causing weather,enhance the early warning capability of disasters,and provide good service guarantees for low-temperature weather in winter.展开更多
A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a...A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a target,based on fixed-time sliding mode control theory.Based on the nonlinear method of fixed-time sliding mode control,the performance of the cooperative guidance law remains satisfactory even with large-heading-errors scenarios where the linearization-based approaches might be invalid.By virtue of this law,the attacker pursues the target with the assistance of the protector,which can intercept the defender in the engagement scenario.Furthermore,if the attacker is intercepted by the defender,the guidance law of the protector could guarantee that the protector attacks the target.A robust adaptive term is included in the guidance law to deal with the case of the unknown disturbance upper bound of the defender-target team.Finally,the feasibility of the guidance law is verified by nonlinear numerical simulations,and the superiority of it is illustrated by comparing with the linearization guidance law.展开更多
Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising stra...Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising strategy to combat these infections.It forms a biodegradable barrier that reduces bacterial adhesion and can deliver local antibiotics,thereby addressing a key mechanism in biofilm formation.Early clinical evidence suggests that DAC®effectively lowers infection recurrence in revision hip and knee arthroplasties,with additional benefits in trauma procedures and soft tissue repairs.Moreover,it has demonstrated compat-ibility with existing implants and surgical techniques,while potentially reducing overall antibiotic use and hospital stays.Despite these encouraging findings,data for its use in primary arthroplasty remains limited,underscoring the need for large-scale,high-quality studies.Future research is poised to refine DAC®’s antimicrobial efficacy through novel antibiotic combinations,personalised delivery systems,and broader applications beyond lower limb procedures.As the prevalence of comorbidities continues to rise,DAC®represents a valuable addi-tion to multifaceted infection control protocols,potentially transforming ortho-paedic care by enhancing patient outcomes and mitigating the economic and clinical burden of implant-related infections.展开更多
Human Resource(HR)operations increasingly rely on cloud-based platforms that provide hiring,payroll,employee management,and compliance services.These systems,typically built on multi-tenant microservice architectures,...Human Resource(HR)operations increasingly rely on cloud-based platforms that provide hiring,payroll,employee management,and compliance services.These systems,typically built on multi-tenant microservice architectures,offer scalability and efficiency but also expand the attack surface for adversaries.Ransomware has emerged as a leading threat in this domain,capable of halting workflows and exposing sensitive employee records.Traditional defenses such as static hardening and signature-based detection often fail to address the dynamic requirements of HR Software as a Service(SaaS),where continuous availability and privacy compliance are critical.This paper presents a Moving Target Defense(MTD)framework for HR SaaS that combines container mutation,IP hopping,and node reassignment to randomize the attack surface without pausing services.Many prior defenses for cloud or IoT rely on static hardening or signature-driven detection and do not meet HR SaaS needs such as uninterrupted sessions,privacy compliance,and live service continuity.This paper presents a MTD framework for HR SaaS that combines container mutation,IP hopping,and node reassignment to randomize the attack surface without pausing services.The framework runs on Kubernetes and uses a KL-divergence-based anomaly detector that monitors HR access logs across five modules(onboarding,employee records,leave,payroll,and exit).In simulation with realistic HR traffic,the approach reaches 96.9% average detection accuracy with AUC 0.94-0.98,cuts mean time to containment to 91.4 s,and lowers the ransomware encryption rate to 13.2%.Measured overheads for CPU,memory,and per-mutation latency remainmodest.Comparedwith priorMTDand non-MTD baselines,the design provides stronger containment without service interruption and aligns with zero-trust and compliance goals.Its modular implementation and control-plane orchestration support stepwise,enterprise-scale deployment in HR SaaS environments.展开更多
Soil salinization is a major abiotic stress that severely constrains global agricultural productivity.The application of exogenous bioactive substances represents a promising strategy to enhance crop salt tolerance.In...Soil salinization is a major abiotic stress that severely constrains global agricultural productivity.The application of exogenous bioactive substances represents a promising strategy to enhance crop salt tolerance.In this study,we investigated the protective role of exogenous myo-inositol in rapeseed under salinity stress.Here,we demonstrated that exogenous application of 20μM myo-inositol significantly alleviates salt stress in rapeseed seedlings.Myo-inositol effectively mitigated growth inhibition,maintained chlorophyll levels and photosynthetic activity,and stabilized membrane integrity under salt stress.Physiological and molecular evidence indicated that myo-inositol activates the antioxidant system by enhancing the activities of superoxide dismutase(SOD),peroxidase(POD),and catalase(CAT),thereby reducing reactive oxygen species accumulation.Notably,myoinositol triggered a species-specific ion homeostasis strategy by increasing Na+accumulation,associated with the upregulation of BnHKT1 and downregulation of vacuolar BnNHX homologs.Concurrently,myo-inositol stimulated proline biosynthesis for osmotic adjustment.Furthermore,qRT-PCR analysis showed that myo-inositol finetunes the expression of key genes involved in antioxidant defense,osmotic adjustment,and stress signaling.These findings demonstrate that myo-inositol enhances rapeseed salt tolerance through an integrated mechanism involving antioxidant activation,transcriptional reprogramming,and a species-specific ion homeostasis strategy,establishing its potential as an effective biostimulant for saline agriculture.展开更多
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man...Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.展开更多
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr...Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.展开更多
Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an ...Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes.展开更多
In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investig...In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investigation of freeze dam- age to citrus occurring in Southern Shaanxi in the winter of 2010, the climatic back- ground for the formation of this freeze damage was analyzed. In combination with the freeze damage indicators during the overwintering period and the harmful accu- mulated cold during the cold wave, indexes for grading the freeze damage in southern Shaanxi were analyzed and verified, and the perspective of grading the freeze damage using the harmful accumulated cold during the cold wave was also presented. Through analyzing the extremely lowest temperature and the harmful ac- cumulated cold in the winter of 2010 and in history at 12 citrus growing counties (districts) in Ankang area and Hanzhong area, the reasons why the freeze damage to citrus during the overwintering period was severer in the west than in the east of Southern Shaanxi were discussed, and the results obtained were basically consistent with the actual situation observed from investigation. Finally, defensive countermea- sures against the freeze damage to citrus during the overwintering period were put forward from several aspects.展开更多
[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-...[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process.展开更多
AIM: To clarify the prevalence of defensive medicine and the specific defensive medicine practices among gastroenterologists in Japan. METHODS: A survey of gastroenterologists in Hiroshima, Japan, was conducted by m...AIM: To clarify the prevalence of defensive medicine and the specific defensive medicine practices among gastroenterologists in Japan. METHODS: A survey of gastroenterologists in Hiroshima, Japan, was conducted by mail in March 2006. The number of gastroenterologists reporting defensive medicine behaviors or changes in their scope of practice and the reported defensive medicine practices, i.e., assurance and avoidance behaviors, were examined. RESULTS: A total of 131 (77%) out of 171 gastroenterologists completed the survey. Three (2%) respondents were sued, and most respondents (96%) had liability insurance. Nearly all respondents (98%) reported practicing defensive medicine. Avoidance behaviors, such as avoiding certain procedures or interventions and avoiding caring for high-risk patients, were very common (96%). Seventy-five percent of respondents reported often avoiding certain procedures or interventions. However, seasoned gastroenterologists (those in practice for more than 20 years) adopted avoidance behaviors significantly less often than those in practice for less than 10 years. Assurance behaviors, i.e., supplying additional services of marginal or no medical value, were also widespread (91%). Sixty-eight percent of respondents reported that they sometimes or often referred patients to other specialists unnecessarily. CONCLUSION: Defensive medicine may be highly prevalent among gastroenterologists throughout 3apan, with potentially serious implications regarding costs, access, and both technical and interpersonal quality of care.展开更多
The experiment was carried out to assess the reaction of different categories of rice genotypes viz., resistant, susceptible, hybrid, scented, popular and wild in response to the infestation by rice leaffolder (RLF)...The experiment was carried out to assess the reaction of different categories of rice genotypes viz., resistant, susceptible, hybrid, scented, popular and wild in response to the infestation by rice leaffolder (RLF), Cnaphalocrocis medinalis (Guenee) and to explore the possible use of these genotypes in developing RLF-resistant rice varieties. The changes of various biochemical constituents such as leaf soluble protein, phenol, ortho-dihydroxy phenol, tannin and enzymes viz., peroxidase, phenyl alanine ammonia lyase (PAL) were assessed spectrophotometrically in all the rice genotypes before and after RLF infestation. The protein profile was analyzed using sodium dodecyl sulphate-poly acrylamide gel electrophoresis (SDS-PAGE) method. A significant constituent of biochemical content such as tannin, phenol and ortho-dihydroxy phenol has been increased along with enzyme activities of peroxidase and PAL in the infested resistant (Ptb 33, TKM6 and LFR831311) and wild rice genotypes (Oryza minuta and O. rhizomatis). A decrease in leaf protein content was evident invariably in all the infested rice genotypes. It is also evident that the contents of biochemicals such as phenol, ortho- dihydroxy phenol and tannin were negatively correlated with leaffolder damage. However, leaf protein content was positively correlated with the damage by rice leaffolder. SDS-PAGE analysis for total protein profiling of healthy and C. medinalis-infested genotypes revealed the enhanced expression of a high molecular weight (〉 97 kDa) protein in all the genotypes. Besides, there was also an increased induction of a 38 kDa protein in C. medinalis infested resistant genotypes, which was absent in uninfested plants. The present investigation proved that the elevated levels of biochemicals and enzymes may play a vital role in rice plants resistance to RLF.展开更多
The pine wood nematode(PWN),Bursaphelenchus xylophilus(Steiner & Buhrer) Nickle,is the pathogen of pine wilt disease(PWD) which can devastate forests.PWN can be of hi gh or low severity and the mechanisms underlyi...The pine wood nematode(PWN),Bursaphelenchus xylophilus(Steiner & Buhrer) Nickle,is the pathogen of pine wilt disease(PWD) which can devastate forests.PWN can be of hi gh or low severity and the mechanisms underlying the differences in virulence are unclear.Therefore,it is necessary to study the relationship between differentiation of PWN severity and its resistance to the main defensive substances of pine species(i.e.,α-pinene and H_(2)O_(2)).The feeding rate and fecundity of PWN was examined at different levels of virulence under conditions of a-pinene and H_(2)O_(2) stress.Moreover,the expression patterns of the main resistance genes of PWN with different virulence were determined under conditions of α-pinene and H_(2)O_(2) stress.The feeding rate and fecundity of the high virulence strain AMA3 were higher than those of the low virulence strain YW4.The expression levels of the autophagy gene BxATG5,cytochrome P450 gene BxCYP33 D3,and glutathione S-transferase genes BxGST1 and BxGST3 in AMA3 increased significantly upon exposure to α-pinene for 2 h,while these genes showed smaller degrees of upregulation in YW4.Under conditions of H_(2)O_(2) stress,the expression levels of BxATG5,catalase genes Bxy-ctl-1 and Bxy-ctl-2,and the 2-cysteine peroxiredoxin gene BxPrx in AMA3 were higher than those in YW4.These findings suggest that high virulence PWN has greater resistance to pine defensive substances α-pinene and H_(2)O_(2) than low virulence PWN,and resistance genes mediate the differential resistance of PWN strains.This study will contribute to the clarification of the mechanism underlying virulence differentiation of PWN and will advance understanding of the pathogenic mechanism of PWD.展开更多
Defensive behaviors induced by innate fear or Pavlovian fear conditioning are crucial for animals to avoid threats and ensure survival.The zona incerta(ZI)has been demonstrated to play important roles in fear learning...Defensive behaviors induced by innate fear or Pavlovian fear conditioning are crucial for animals to avoid threats and ensure survival.The zona incerta(ZI)has been demonstrated to play important roles in fear learning and fear memory,as well as modulating auditory-induced innate defensive behavior.However,whether the neuronal subtypes in the ZI and specific circuits can mediate the innate fear response is largely unknown.Here,we found that somatostatin(SST)-positive neurons in the rostral ZI of mice were activated by a visual innate fear stimulus.Optogenetic inhibition of SST-positive neurons in the rostral ZI resulted in reduced flight responses to an overhead looming stimulus.Optogenetic activation of SST-positive neurons in the rostral ZI induced fear-like defensive behavior including increased immobility and bradycardia.In addition,we demonstrated that manipulation of the GABAergic projections from SST-positive neurons in the rostral ZI to the downstream nucleus reuniens(Re)mediated fear-like defensive behavior.Retrograde trans-synaptic tracing also revealed looming stimulus-activated neurons in the superior colliculus(SC)that projected to the Re-projecting SST-positive neurons in the rostral ZI(SC-ZIrSST-Re pathway).Together,our study elucidates the function of SST-positive neurons in the rostral ZI and the SC-ZIrSST-Re tri-synaptic circuit in mediating the innate fear response.展开更多
Defensive medicine is widespread and practiced the world over, with serious consequences for patients, doctors, and healthcare costs. Even students and resi-dents are exposed to defensive medicine practices and taught...Defensive medicine is widespread and practiced the world over, with serious consequences for patients, doctors, and healthcare costs. Even students and resi-dents are exposed to defensive medicine practices and taught to take malpractice liability into consideration when making clinical decisions. Defensive medicine is generally thought to stem from physicians' perception that they can easily be sued by patients or their relatives who seek compensation for presumed medical errors. However, in our view the growth of defensive medicine should be seen in the context of larger changes in the conception of medicine that have taken place in the last few decades, undermining the patient–physician trust, which has traditionally been the main source of professional satisfaction for physicians. These changes include the following: time directly spent with patients has been overtaken by time devoted to electronic health records and desk work; family doctors have played a progressively less central role; clinical reasoning is being replaced by guidelines and algorithms; the public at large and a number of young physicians tend to believe that medicine is a perfect science rather than an imperfect art, as it continues to be; and modern societies do not tolerate the inevitable morbidity and mortality. To finally reduce the increasing defensive behavior of doctors around the world, the decriminalization of medical errors and the assurance that they can be dealt with in civil courts or by medical organizations in all countries could help but it would not suffice. Physicians and surgeons should be allowed to spend the time they need with their patients and should give clinical reasoning the importance it deserves. The institutions should support the doctors who have experienced adverse patient events, and the media should stop reporting with excessive evidence presumed medical errors and subject physicians to "public trials" before they are eventually judged in court.展开更多
Glandular trichomes of plants produce a wide variety of secondary metabolites which are considered as major defensive chemicals. The capitate glandular trichomes of Oenothera glazioviana(Onagraceae) were collected wit...Glandular trichomes of plants produce a wide variety of secondary metabolites which are considered as major defensive chemicals. The capitate glandular trichomes of Oenothera glazioviana(Onagraceae) were collected with laser microdissection and analyzed by gas chromatography-mass spectrometry. The volatile compound 4-hydroxy-4-methylpentan-2-one(1) was identified. We found that compound 1 displays antimicrobial, insecticidal, and phytotoxic activities. These results suggest that compound 1 might function as a defensive compound in the capitate glandular trichomes of O. glazioviana against pathogens, insect herbivores, and presumably competitive plants as well.展开更多
Objective: The objective of this study was to reduce or avoid the occurrence of the cases of osteofascial compartment syndrome induced by a radial artery puncture for arterial blood gas analysis. Methods: We analyze...Objective: The objective of this study was to reduce or avoid the occurrence of the cases of osteofascial compartment syndrome induced by a radial artery puncture for arterial blood gas analysis. Methods: We analyzed an adverse event using cheese model analysis, "fish bone" analysis, root cause analysis, and other methods. Results: There are three root causes leading to an adverse event: operation technique, assessment of the disease, and informing patient families. However, there are many reasons to promote the occurrence and development of the event. Conclusions: We should analyze and manage the adverse events in patients from the point of view of a system. Developing the measures of a system defense can enhance patient safety and create a good safety culture.展开更多
Coral snakes and their mimics often have brightly colored banded patterns, generally associated with warning colora- tion or mimicry. However, such color patterns have also been hypothesized to aid snakes in escaping ...Coral snakes and their mimics often have brightly colored banded patterns, generally associated with warning colora- tion or mimicry. However, such color patterns have also been hypothesized to aid snakes in escaping predators through a "flicker-fusion" effect. According to this hypothesis, banded color patterns confuse potential predators when a snake transitions from resting to moving because its bands blur together to form a different color. To produce this motion blur, a moving snake's bands must transition faster than the critical flicker-fusion rate at which a predator's photoreceptors can refresh. It is unknown if coral snakes or their mimics meet this requirement. We tested this hypothesis by measuring the movement speed and color pat- terns of two coral snake mimics, Lampropeltis triangulum campbelli and L. elapsoides, and comparing the frequency of color transitions to the photoreceptor activity of the avian eye. We found that snakes often produced a motion blur, but moving snakes created a blurring effect more often in darker conditions, such as sunrise, sunset, and nighttime when these snakes are often active. Thus, at least two species of coral snake mimics are capable of achieving flicker-fusion, indicating that their color patterns may confer an additional defense aside from mimicry展开更多
The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such c...The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such complex technological services raise several security concerns. One of the most critical concerns is cross-site scripting (XSS) attacks. This paper has concentrated on revealing and comprehensively analyzing XSS injection attacks, detection, and prevention concisely and accurately. I have done a thorough study and reviewed several research papers and publications with a specific focus on the researchers’ defensive techniques for preventing XSS attacks and subdivided them into five categories: machine learning techniques, server-side techniques, client-side techniques, proxy-based techniques, and combined approaches. The majority of existing cutting-edge XSS defensive approaches carefully analyzed in this paper offer protection against the traditional XSS attacks, such as stored and reflected XSS. There is currently no reliable solution to provide adequate protection against the newly discovered XSS attack known as DOM-based and mutation-based XSS attacks. After reading all of the proposed models and identifying their drawbacks, I recommend a combination of static, dynamic, and code auditing in conjunction with secure coding and continuous user awareness campaigns about XSS emerging attacks.展开更多
文摘The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mongolian low vortex is the main weather system that triggers snowstorms,and can be classified into three types:small trough development,horizontal trough becoming vertical,and low trough moving eastwards.Snowstorms pose a relatively serious threat to agricultural and animal husbandry production,transportation,power and communication in Tongliao.Especially in spring,snowstorm weather poses a greater threat to agriculture and animal husbandry in Tongliao.It is needed to pay attention to the impact of extreme weather and climate events such as snowstorms,strengthen research on the mechanisms of disaster-causing weather,enhance the early warning capability of disasters,and provide good service guarantees for low-temperature weather in winter.
基金supported by the National Natural Science Foundation of China(62273119).
文摘A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a target,based on fixed-time sliding mode control theory.Based on the nonlinear method of fixed-time sliding mode control,the performance of the cooperative guidance law remains satisfactory even with large-heading-errors scenarios where the linearization-based approaches might be invalid.By virtue of this law,the attacker pursues the target with the assistance of the protector,which can intercept the defender in the engagement scenario.Furthermore,if the attacker is intercepted by the defender,the guidance law of the protector could guarantee that the protector attacks the target.A robust adaptive term is included in the guidance law to deal with the case of the unknown disturbance upper bound of the defender-target team.Finally,the feasibility of the guidance law is verified by nonlinear numerical simulations,and the superiority of it is illustrated by comparing with the linearization guidance law.
文摘Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising strategy to combat these infections.It forms a biodegradable barrier that reduces bacterial adhesion and can deliver local antibiotics,thereby addressing a key mechanism in biofilm formation.Early clinical evidence suggests that DAC®effectively lowers infection recurrence in revision hip and knee arthroplasties,with additional benefits in trauma procedures and soft tissue repairs.Moreover,it has demonstrated compat-ibility with existing implants and surgical techniques,while potentially reducing overall antibiotic use and hospital stays.Despite these encouraging findings,data for its use in primary arthroplasty remains limited,underscoring the need for large-scale,high-quality studies.Future research is poised to refine DAC®’s antimicrobial efficacy through novel antibiotic combinations,personalised delivery systems,and broader applications beyond lower limb procedures.As the prevalence of comorbidities continues to rise,DAC®represents a valuable addi-tion to multifaceted infection control protocols,potentially transforming ortho-paedic care by enhancing patient outcomes and mitigating the economic and clinical burden of implant-related infections.
文摘Human Resource(HR)operations increasingly rely on cloud-based platforms that provide hiring,payroll,employee management,and compliance services.These systems,typically built on multi-tenant microservice architectures,offer scalability and efficiency but also expand the attack surface for adversaries.Ransomware has emerged as a leading threat in this domain,capable of halting workflows and exposing sensitive employee records.Traditional defenses such as static hardening and signature-based detection often fail to address the dynamic requirements of HR Software as a Service(SaaS),where continuous availability and privacy compliance are critical.This paper presents a Moving Target Defense(MTD)framework for HR SaaS that combines container mutation,IP hopping,and node reassignment to randomize the attack surface without pausing services.Many prior defenses for cloud or IoT rely on static hardening or signature-driven detection and do not meet HR SaaS needs such as uninterrupted sessions,privacy compliance,and live service continuity.This paper presents a MTD framework for HR SaaS that combines container mutation,IP hopping,and node reassignment to randomize the attack surface without pausing services.The framework runs on Kubernetes and uses a KL-divergence-based anomaly detector that monitors HR access logs across five modules(onboarding,employee records,leave,payroll,and exit).In simulation with realistic HR traffic,the approach reaches 96.9% average detection accuracy with AUC 0.94-0.98,cuts mean time to containment to 91.4 s,and lowers the ransomware encryption rate to 13.2%.Measured overheads for CPU,memory,and per-mutation latency remainmodest.Comparedwith priorMTDand non-MTD baselines,the design provides stronger containment without service interruption and aligns with zero-trust and compliance goals.Its modular implementation and control-plane orchestration support stepwise,enterprise-scale deployment in HR SaaS environments.
基金the Biological Breeding-National Science and Technology Major Project(2022ZD04008)the National Natural Science Foundation of China(32301864 and 32472114)the Central Public-interest Scientific Institution Basal Research Fund(Y2025QC16 and Y2025CG06)。
文摘Soil salinization is a major abiotic stress that severely constrains global agricultural productivity.The application of exogenous bioactive substances represents a promising strategy to enhance crop salt tolerance.In this study,we investigated the protective role of exogenous myo-inositol in rapeseed under salinity stress.Here,we demonstrated that exogenous application of 20μM myo-inositol significantly alleviates salt stress in rapeseed seedlings.Myo-inositol effectively mitigated growth inhibition,maintained chlorophyll levels and photosynthetic activity,and stabilized membrane integrity under salt stress.Physiological and molecular evidence indicated that myo-inositol activates the antioxidant system by enhancing the activities of superoxide dismutase(SOD),peroxidase(POD),and catalase(CAT),thereby reducing reactive oxygen species accumulation.Notably,myoinositol triggered a species-specific ion homeostasis strategy by increasing Na+accumulation,associated with the upregulation of BnHKT1 and downregulation of vacuolar BnNHX homologs.Concurrently,myo-inositol stimulated proline biosynthesis for osmotic adjustment.Furthermore,qRT-PCR analysis showed that myo-inositol finetunes the expression of key genes involved in antioxidant defense,osmotic adjustment,and stress signaling.These findings demonstrate that myo-inositol enhances rapeseed salt tolerance through an integrated mechanism involving antioxidant activation,transcriptional reprogramming,and a species-specific ion homeostasis strategy,establishing its potential as an effective biostimulant for saline agriculture.
基金supported by 2023 Higher Education Scientific Research Planning Project of China Society of Higher Education(No.23PG0408)2023 Philosophy and Social Science Research Programs in Jiangsu Province(No.2023SJSZ0993)+2 种基金Nantong Science and Technology Project(No.JC2023070)Key Project of Jiangsu Province Education Science 14th Five-Year Plan(Grant No.B-b/2024/02/41)the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202407).
文摘Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.
文摘Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.
基金supported by Punjab Agricultural University,Ludhiana,India,for providing the infrastructure and other facilities for conducting experiments.All other forms of support and financial assistance are duly acknowledged.
文摘Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes.
基金Supported by Shaanxi"13115"Public Service Platform Construction Program for Science&Technology Innovation Projects(2010FWPT-17)~~
文摘In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investigation of freeze dam- age to citrus occurring in Southern Shaanxi in the winter of 2010, the climatic back- ground for the formation of this freeze damage was analyzed. In combination with the freeze damage indicators during the overwintering period and the harmful accu- mulated cold during the cold wave, indexes for grading the freeze damage in southern Shaanxi were analyzed and verified, and the perspective of grading the freeze damage using the harmful accumulated cold during the cold wave was also presented. Through analyzing the extremely lowest temperature and the harmful ac- cumulated cold in the winter of 2010 and in history at 12 citrus growing counties (districts) in Ankang area and Hanzhong area, the reasons why the freeze damage to citrus during the overwintering period was severer in the west than in the east of Southern Shaanxi were discussed, and the results obtained were basically consistent with the actual situation observed from investigation. Finally, defensive countermea- sures against the freeze damage to citrus during the overwintering period were put forward from several aspects.
基金Supported by Research Fund of the State Tobacco Monopoly Bureau(110201002002)the Open Research Project of Key Laboratory of Tobacco Genetics and Breeding in the Tobacco Industry(TB201006)~~
文摘[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process.
文摘AIM: To clarify the prevalence of defensive medicine and the specific defensive medicine practices among gastroenterologists in Japan. METHODS: A survey of gastroenterologists in Hiroshima, Japan, was conducted by mail in March 2006. The number of gastroenterologists reporting defensive medicine behaviors or changes in their scope of practice and the reported defensive medicine practices, i.e., assurance and avoidance behaviors, were examined. RESULTS: A total of 131 (77%) out of 171 gastroenterologists completed the survey. Three (2%) respondents were sued, and most respondents (96%) had liability insurance. Nearly all respondents (98%) reported practicing defensive medicine. Avoidance behaviors, such as avoiding certain procedures or interventions and avoiding caring for high-risk patients, were very common (96%). Seventy-five percent of respondents reported often avoiding certain procedures or interventions. However, seasoned gastroenterologists (those in practice for more than 20 years) adopted avoidance behaviors significantly less often than those in practice for less than 10 years. Assurance behaviors, i.e., supplying additional services of marginal or no medical value, were also widespread (91%). Sixty-eight percent of respondents reported that they sometimes or often referred patients to other specialists unnecessarily. CONCLUSION: Defensive medicine may be highly prevalent among gastroenterologists throughout 3apan, with potentially serious implications regarding costs, access, and both technical and interpersonal quality of care.
文摘The experiment was carried out to assess the reaction of different categories of rice genotypes viz., resistant, susceptible, hybrid, scented, popular and wild in response to the infestation by rice leaffolder (RLF), Cnaphalocrocis medinalis (Guenee) and to explore the possible use of these genotypes in developing RLF-resistant rice varieties. The changes of various biochemical constituents such as leaf soluble protein, phenol, ortho-dihydroxy phenol, tannin and enzymes viz., peroxidase, phenyl alanine ammonia lyase (PAL) were assessed spectrophotometrically in all the rice genotypes before and after RLF infestation. The protein profile was analyzed using sodium dodecyl sulphate-poly acrylamide gel electrophoresis (SDS-PAGE) method. A significant constituent of biochemical content such as tannin, phenol and ortho-dihydroxy phenol has been increased along with enzyme activities of peroxidase and PAL in the infested resistant (Ptb 33, TKM6 and LFR831311) and wild rice genotypes (Oryza minuta and O. rhizomatis). A decrease in leaf protein content was evident invariably in all the infested rice genotypes. It is also evident that the contents of biochemicals such as phenol, ortho- dihydroxy phenol and tannin were negatively correlated with leaffolder damage. However, leaf protein content was positively correlated with the damage by rice leaffolder. SDS-PAGE analysis for total protein profiling of healthy and C. medinalis-infested genotypes revealed the enhanced expression of a high molecular weight (〉 97 kDa) protein in all the genotypes. Besides, there was also an increased induction of a 38 kDa protein in C. medinalis infested resistant genotypes, which was absent in uninfested plants. The present investigation proved that the elevated levels of biochemicals and enzymes may play a vital role in rice plants resistance to RLF.
基金funded partly by the National Key Research and Development Program of China(No.2018YFD0600203)the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)+1 种基金Innovation and Entrepreneurship Training Program for Students of Jiangsu Higher Education Institutions (SPITP)Innovation and Entrepreneurship Training Program for Students of Nanjing Forestry University (No.201710298047Z)。
文摘The pine wood nematode(PWN),Bursaphelenchus xylophilus(Steiner & Buhrer) Nickle,is the pathogen of pine wilt disease(PWD) which can devastate forests.PWN can be of hi gh or low severity and the mechanisms underlying the differences in virulence are unclear.Therefore,it is necessary to study the relationship between differentiation of PWN severity and its resistance to the main defensive substances of pine species(i.e.,α-pinene and H_(2)O_(2)).The feeding rate and fecundity of PWN was examined at different levels of virulence under conditions of a-pinene and H_(2)O_(2) stress.Moreover,the expression patterns of the main resistance genes of PWN with different virulence were determined under conditions of α-pinene and H_(2)O_(2) stress.The feeding rate and fecundity of the high virulence strain AMA3 were higher than those of the low virulence strain YW4.The expression levels of the autophagy gene BxATG5,cytochrome P450 gene BxCYP33 D3,and glutathione S-transferase genes BxGST1 and BxGST3 in AMA3 increased significantly upon exposure to α-pinene for 2 h,while these genes showed smaller degrees of upregulation in YW4.Under conditions of H_(2)O_(2) stress,the expression levels of BxATG5,catalase genes Bxy-ctl-1 and Bxy-ctl-2,and the 2-cysteine peroxiredoxin gene BxPrx in AMA3 were higher than those in YW4.These findings suggest that high virulence PWN has greater resistance to pine defensive substances α-pinene and H_(2)O_(2) than low virulence PWN,and resistance genes mediate the differential resistance of PWN strains.This study will contribute to the clarification of the mechanism underlying virulence differentiation of PWN and will advance understanding of the pathogenic mechanism of PWD.
基金supported by the Science and Technology Innovation 2030-Major Project of Brain Science and Brain-like Research(2021ZD0202700,2021ZD0202702)the Key-Area Research and Development Program of Guangdong Province(2019B030335001,2018B030334001)+6 种基金the Major Program of the National Natural Science Foundation of China(82090030,82090031)the CAMS Innovation Fund for Medical Sciences(2019-12M-5-057)the Ministry of Science and Technology(2019YFA0110103)the National Natural Science Foundation of China(81870898)the Fundamental Research Funds for the Central Universities(2021FZZX001-37)the Zhejiang Provincial Natural Science Foundation(LR18H090002)the Young Scientist Program of the National Natural Science Foundation of China(82001135).
文摘Defensive behaviors induced by innate fear or Pavlovian fear conditioning are crucial for animals to avoid threats and ensure survival.The zona incerta(ZI)has been demonstrated to play important roles in fear learning and fear memory,as well as modulating auditory-induced innate defensive behavior.However,whether the neuronal subtypes in the ZI and specific circuits can mediate the innate fear response is largely unknown.Here,we found that somatostatin(SST)-positive neurons in the rostral ZI of mice were activated by a visual innate fear stimulus.Optogenetic inhibition of SST-positive neurons in the rostral ZI resulted in reduced flight responses to an overhead looming stimulus.Optogenetic activation of SST-positive neurons in the rostral ZI induced fear-like defensive behavior including increased immobility and bradycardia.In addition,we demonstrated that manipulation of the GABAergic projections from SST-positive neurons in the rostral ZI to the downstream nucleus reuniens(Re)mediated fear-like defensive behavior.Retrograde trans-synaptic tracing also revealed looming stimulus-activated neurons in the superior colliculus(SC)that projected to the Re-projecting SST-positive neurons in the rostral ZI(SC-ZIrSST-Re pathway).Together,our study elucidates the function of SST-positive neurons in the rostral ZI and the SC-ZIrSST-Re tri-synaptic circuit in mediating the innate fear response.
文摘Defensive medicine is widespread and practiced the world over, with serious consequences for patients, doctors, and healthcare costs. Even students and resi-dents are exposed to defensive medicine practices and taught to take malpractice liability into consideration when making clinical decisions. Defensive medicine is generally thought to stem from physicians' perception that they can easily be sued by patients or their relatives who seek compensation for presumed medical errors. However, in our view the growth of defensive medicine should be seen in the context of larger changes in the conception of medicine that have taken place in the last few decades, undermining the patient–physician trust, which has traditionally been the main source of professional satisfaction for physicians. These changes include the following: time directly spent with patients has been overtaken by time devoted to electronic health records and desk work; family doctors have played a progressively less central role; clinical reasoning is being replaced by guidelines and algorithms; the public at large and a number of young physicians tend to believe that medicine is a perfect science rather than an imperfect art, as it continues to be; and modern societies do not tolerate the inevitable morbidity and mortality. To finally reduce the increasing defensive behavior of doctors around the world, the decriminalization of medical errors and the assurance that they can be dealt with in civil courts or by medical organizations in all countries could help but it would not suffice. Physicians and surgeons should be allowed to spend the time they need with their patients and should give clinical reasoning the importance it deserves. The institutions should support the doctors who have experienced adverse patient events, and the media should stop reporting with excessive evidence presumed medical errors and subject physicians to "public trials" before they are eventually judged in court.
基金supported financially by the National Science Fund for Distinguished Young Scholars(31525005)the NSFC-Yunnan Joint Fund (U1202263)+1 种基金the National Basic Research Program of China (973 Program) on Biological Control of Key Crop Pathogenic Nematodes (2013CB127505)the "Hundred Talents Program" of the Chinese Academy of Sciences (awarded to S.-H. Li)
文摘Glandular trichomes of plants produce a wide variety of secondary metabolites which are considered as major defensive chemicals. The capitate glandular trichomes of Oenothera glazioviana(Onagraceae) were collected with laser microdissection and analyzed by gas chromatography-mass spectrometry. The volatile compound 4-hydroxy-4-methylpentan-2-one(1) was identified. We found that compound 1 displays antimicrobial, insecticidal, and phytotoxic activities. These results suggest that compound 1 might function as a defensive compound in the capitate glandular trichomes of O. glazioviana against pathogens, insect herbivores, and presumably competitive plants as well.
文摘Objective: The objective of this study was to reduce or avoid the occurrence of the cases of osteofascial compartment syndrome induced by a radial artery puncture for arterial blood gas analysis. Methods: We analyzed an adverse event using cheese model analysis, "fish bone" analysis, root cause analysis, and other methods. Results: There are three root causes leading to an adverse event: operation technique, assessment of the disease, and informing patient families. However, there are many reasons to promote the occurrence and development of the event. Conclusions: We should analyze and manage the adverse events in patients from the point of view of a system. Developing the measures of a system defense can enhance patient safety and create a good safety culture.
文摘Coral snakes and their mimics often have brightly colored banded patterns, generally associated with warning colora- tion or mimicry. However, such color patterns have also been hypothesized to aid snakes in escaping predators through a "flicker-fusion" effect. According to this hypothesis, banded color patterns confuse potential predators when a snake transitions from resting to moving because its bands blur together to form a different color. To produce this motion blur, a moving snake's bands must transition faster than the critical flicker-fusion rate at which a predator's photoreceptors can refresh. It is unknown if coral snakes or their mimics meet this requirement. We tested this hypothesis by measuring the movement speed and color pat- terns of two coral snake mimics, Lampropeltis triangulum campbelli and L. elapsoides, and comparing the frequency of color transitions to the photoreceptor activity of the avian eye. We found that snakes often produced a motion blur, but moving snakes created a blurring effect more often in darker conditions, such as sunrise, sunset, and nighttime when these snakes are often active. Thus, at least two species of coral snake mimics are capable of achieving flicker-fusion, indicating that their color patterns may confer an additional defense aside from mimicry
文摘The advancement of technology and the digitization of organizational functions and services have propelled the world into a new era of computing capability and sophistication. The proliferation and usability of such complex technological services raise several security concerns. One of the most critical concerns is cross-site scripting (XSS) attacks. This paper has concentrated on revealing and comprehensively analyzing XSS injection attacks, detection, and prevention concisely and accurately. I have done a thorough study and reviewed several research papers and publications with a specific focus on the researchers’ defensive techniques for preventing XSS attacks and subdivided them into five categories: machine learning techniques, server-side techniques, client-side techniques, proxy-based techniques, and combined approaches. The majority of existing cutting-edge XSS defensive approaches carefully analyzed in this paper offer protection against the traditional XSS attacks, such as stored and reflected XSS. There is currently no reliable solution to provide adequate protection against the newly discovered XSS attack known as DOM-based and mutation-based XSS attacks. After reading all of the proposed models and identifying their drawbacks, I recommend a combination of static, dynamic, and code auditing in conjunction with secure coding and continuous user awareness campaigns about XSS emerging attacks.