Oligosaccharins are potent biomolecules which activate defense responses and resistance in tobacco plants. However, it is not known the systemic behavior of defensive enzymes activated by these elicitors. In this work...Oligosaccharins are potent biomolecules which activate defense responses and resistance in tobacco plants. However, it is not known the systemic behavior of defensive enzymes activated by these elicitors. In this work, the dynamic behavior of key defensive enzymes was evaluated in tobacco plant leaves previously treated through the roots with chitosan polymer (CH), chitosan (COS) and pectic (OGAS) oligosaccharides and Spermine (Sp). All macromolecules tested activated protein levels and defense enzymatic activity in tobacco leaves but with different response dynamics among them and depending on the biochemical variable evaluated. Defense response above control levels were detected since 12 hours after treatments and it consisted in a biphasic behavior with two peaks for PAL (EC 4.3.1.5) and β 1 - 3 glucanase (EC 3.2.1.6) enzymatic activities. The highest enzymatic levels for these enzymes were achieved at 48 hours in plantlets elicited with COS and at 72 hours for those plants treated with chitosan polymer, while the highest POD (EC 1.11.1.6) activity was detected with CH between 48 and 72 hours. These results demonstrated systemic defense activation by oligosaccharins in tobacco whose dynamic of defense response is affected by the kind of oligosaccharins tested. When applying OGAS by foliar spray on tobacco, systemic resistance against Phytoththora nicotianae was induced and plantlets were protected with the low concentration tested by 46% under the bioassays conditions performed. Moreover, enzymatic determinations on roots and leaves previous to plant-pathogen interaction showed increments above 30% of control levels for PAL and POD activities. It means that oligosaccharins activate local and systemic defense responses in plants in the absent of pathogen infection.展开更多
Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairme...Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairments is essential for the long-term production of sweetpotatoes.Melatonin has been recognised for its capacity to assist plants in dealing with abiotic stress conditions.This research aimed to investigate how different doses of exogenous melatonin influence heat damage in sweetpotato plants.Heat stress drastically affected shoot and root fresh weight by 31.8 and 44.5%,respectively.This reduction resulted in oxidative stress characterised by increased formation of hydrogen peroxide(H_(2)O_(2))by 804.4%,superoxide ion(O_(2)^(·-))by 211.5%and malondialdehyde(MDA)by 234.2%.Heat stress also reduced chlorophyll concentration,photosystemⅡefficiency(F_v/F_m)by 15.3%and gaseous exchange.However,pre-treatment with 100μmol L^(-1)melatonin increased growth and reduced oxidative damage to sweetpotato plants under heat stress.In particular,melatonin decreased H_(2)O_(2),O_(2)^(·-)and MDA by 64.8%,42.7%and 38.2%,respectively.Melatonin also mitigated the decline in chlorophyll levels and improved stomatal traits,gaseous exchange and F_(v)/F_(m)(13%).Results suggested that the favorable outcomes of melatonin treatment can be associated with elevated antioxidant enzyme activity and an increase in non-enzymatic antioxidants and osmo-protectants.Overall,these findings indicate that exogenous melatonin can improve heat stress tolerance in sweetpotatoes.This stu dy will assist re searchers in further investigating how melatonin makes sweetpotatoes more resistant to heat stress.展开更多
A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a...A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a target,based on fixed-time sliding mode control theory.Based on the nonlinear method of fixed-time sliding mode control,the performance of the cooperative guidance law remains satisfactory even with large-heading-errors scenarios where the linearization-based approaches might be invalid.By virtue of this law,the attacker pursues the target with the assistance of the protector,which can intercept the defender in the engagement scenario.Furthermore,if the attacker is intercepted by the defender,the guidance law of the protector could guarantee that the protector attacks the target.A robust adaptive term is included in the guidance law to deal with the case of the unknown disturbance upper bound of the defender-target team.Finally,the feasibility of the guidance law is verified by nonlinear numerical simulations,and the superiority of it is illustrated by comparing with the linearization guidance law.展开更多
Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising stra...Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising strategy to combat these infections.It forms a biodegradable barrier that reduces bacterial adhesion and can deliver local antibiotics,thereby addressing a key mechanism in biofilm formation.Early clinical evidence suggests that DAC®effectively lowers infection recurrence in revision hip and knee arthroplasties,with additional benefits in trauma procedures and soft tissue repairs.Moreover,it has demonstrated compat-ibility with existing implants and surgical techniques,while potentially reducing overall antibiotic use and hospital stays.Despite these encouraging findings,data for its use in primary arthroplasty remains limited,underscoring the need for large-scale,high-quality studies.Future research is poised to refine DAC®’s antimicrobial efficacy through novel antibiotic combinations,personalised delivery systems,and broader applications beyond lower limb procedures.As the prevalence of comorbidities continues to rise,DAC®represents a valuable addi-tion to multifaceted infection control protocols,potentially transforming ortho-paedic care by enhancing patient outcomes and mitigating the economic and clinical burden of implant-related infections.展开更多
The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mong...The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mongolian low vortex is the main weather system that triggers snowstorms,and can be classified into three types:small trough development,horizontal trough becoming vertical,and low trough moving eastwards.Snowstorms pose a relatively serious threat to agricultural and animal husbandry production,transportation,power and communication in Tongliao.Especially in spring,snowstorm weather poses a greater threat to agriculture and animal husbandry in Tongliao.It is needed to pay attention to the impact of extreme weather and climate events such as snowstorms,strengthen research on the mechanisms of disaster-causing weather,enhance the early warning capability of disasters,and provide good service guarantees for low-temperature weather in winter.展开更多
This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey...This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey growth,the system reduces to a perturbed singular system,whose limit cycles can be analyzed using geometric singular perturbation methods-primarily through the study of a slow-divergence integral.Our work completes partially the results previously obtained by Li and Zhu and by Hsu.We provide a comprehensive classification of all possible singular cycles capable of generating limit cycles and analyze the slow-divergence integral for the nine distinct types of cycle families that arise in a canard explosion.Based on these findings,we demonstrate that the maximum number of limit cycles emerging from the singular cycles is two in all cases,thereby confirming conjectures posed by Rothe-Shafer and Xiao-Ruan.展开更多
Plants are under constant exposure to varied biotic and abiotic stresses,which significantly affect their growth,productivity,and survival.Biotic stress,caused by pathogens,and abiotic stress,including drought,salinit...Plants are under constant exposure to varied biotic and abiotic stresses,which significantly affect their growth,productivity,and survival.Biotic stress,caused by pathogens,and abiotic stress,including drought,salinity,extreme temperatures,and heavy metals,activate overlapping yet distinct immune pathways.These are comprised of morphological barriers,hormonal signaling,and the induction of stress-responsive genes through complex pathways mediated by reactive oxygen species(ROS),phytohormones,and secondary metabolites.Abiotic stress triggers organelle-mediated retrograde signaling from organelles like chloroplasts and mitochondria,which causes unfolded protein responses and the regulation of cellular homeostasis.Simultaneously,biotic stress activates both PAMP-triggered immunity(PTI)and effector-triggered immunity(ETI),mediated by salicylic acid(SA),jasmonic acid(JA),and ethylene(ET).This review aims to provide an integrated overview of plant immune responses tomultiple stressors,with emphasis on molecular crosstalk and recent technological interventions.A systematic literature search was conducted using the Scopus database,covering studies published between 2010 and 2025.Advances in CRISPR-Cas genome editing,RNA interference,omics technologies,nanotechnology,and artificial intelligence have improved our knowledge of plant stress physiology and facilitated the design of resilient crop varieties.Despite these advances,the integration of immune signals under simultaneous biotic and abiotic stress remains poorly understood,particularly at tissue-specific and cellular levels.Additionally,practical challenges persist in delivery methods,regulatory hurdles,and long-term field validation.With the escalation of climate change,understanding the complex crosstalk between stress signalling pathways is essential formaintaining sustainable agriculture and global food security.Future directions point toward real-time monitoring tools,such as single-cell omics and spatial transcriptomics,to fine-tune immune responses and support precision crop improvement.展开更多
To solve security problems in cross-technology communication(CTC),we take the Internet of Things(IoT)control system as an example,and propose a comprehensive solution against the attack on the physical layer CTC from ...To solve security problems in cross-technology communication(CTC),we take the Internet of Things(IoT)control system as an example,and propose a comprehensive solution against the attack on the physical layer CTC from ZigBee to Wi-Fi.Specifically,we propose a noise interference strategy by adding an appropriate amount of dedicated noise signals,which can interfere with the eavesdropping and simulation of ZigBee signals without affecting the reception of the receiver.Moreover,we also propose a regression modeling strategy which collects data,extracts features,and trains a binary logistic regression model so that the receiver can actively distinguish simulated attack signals.We build the experimental platform by using GNU Radio and USRP devices.Experimental results demonstrate that the security defense strategies can identify and distinguish the signals from the attacker with a high accuracy,effectively solving the signal emulation attack on the physical layer CTC from ZigBee to Wi-Fi.展开更多
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de...Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels.展开更多
In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investig...In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investigation of freeze dam- age to citrus occurring in Southern Shaanxi in the winter of 2010, the climatic back- ground for the formation of this freeze damage was analyzed. In combination with the freeze damage indicators during the overwintering period and the harmful accu- mulated cold during the cold wave, indexes for grading the freeze damage in southern Shaanxi were analyzed and verified, and the perspective of grading the freeze damage using the harmful accumulated cold during the cold wave was also presented. Through analyzing the extremely lowest temperature and the harmful ac- cumulated cold in the winter of 2010 and in history at 12 citrus growing counties (districts) in Ankang area and Hanzhong area, the reasons why the freeze damage to citrus during the overwintering period was severer in the west than in the east of Southern Shaanxi were discussed, and the results obtained were basically consistent with the actual situation observed from investigation. Finally, defensive countermea- sures against the freeze damage to citrus during the overwintering period were put forward from several aspects.展开更多
At evaluating the combat effectiveness of the defense system, target′s probability to penetrate the defended area is a primary care taking index. In this paper, stochastic model to compete the probability that targe...At evaluating the combat effectiveness of the defense system, target′s probability to penetrate the defended area is a primary care taking index. In this paper, stochastic model to compete the probability that target penetrates the defended area along any flight path is established by the state analysis and statistical equilibrium analysis of stochastic service system theory. The simulated annealing algorithm is an enlightening random search method based on Monte Carlo recursion, and it can find global optimal solution by simulating annealing process. Combining stochastic model to compete the probability and simulated annealing algorithm, this paper establishes the method to solve problem quantitatively about combat configuration optimization of weapon systems. The calculated result shows that the perfect configuration for fire cells of the weapon is fast found by using this method, and this quantificational method for combat configuration is faster and more scientific than previous one based on principle via map fire field.展开更多
[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-...[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process.展开更多
The performance of deep recommendation models degrades significantly under data poisoning attacks.While adversarial training methods such as Vulnerability-Aware Training(VAT)enhance robustness by injecting perturbatio...The performance of deep recommendation models degrades significantly under data poisoning attacks.While adversarial training methods such as Vulnerability-Aware Training(VAT)enhance robustness by injecting perturbations into embeddings,they remain limited by coarse-grained noise and a static defense strategy,leaving models susceptible to adaptive attacks.This study proposes a novel framework,Self-Purification Data Sanitization(SPD),which integrates vulnerability-aware adversarial training with dynamic label correction.Specifically,SPD first identifies high-risk users through a fragility scoring mechanism,then applies self-purification by replacing suspicious interactions with model-predicted high-confidence labels during training.This closed-loop process continuously sanitizes the training data and breaks the protection ceiling of conventional adversarial training.Experiments demonstrate that SPD significantly improves the robustness of both Matrix Factorization(MF)and LightGCN models against various poisoning attacks.We show that SPD effectively suppresses malicious gradient propagation and maintains recommendation accuracy.Evaluations on Gowalla and Yelp2018 confirmthat SPD-trainedmodels withstandmultiple attack strategies—including Random,Bandwagon,DP,and Rev attacks—while preserving performance.展开更多
Understanding the molecular responses of tea leaves to mechanical stress is crucial for elucidating the mechanisms of post-harvest quality formation during oolong tea processing.This study employed an integrated multi...Understanding the molecular responses of tea leaves to mechanical stress is crucial for elucidating the mechanisms of post-harvest quality formation during oolong tea processing.This study employed an integrated multi-omics strategy to characterize the changes and interactions among metabolomic(MB),transcriptomic(TX),and proteomic(PT)profiles in mechanically stressed tea leaves.Mechanical stress initially activated damage-associated molecular patterns(DAMPs),including Ca^(2+)signaling,jasmonic acid signaling,and glutathione metabolism pathways.These processes subsequently induced quality-related metabolic pathways(QRMPs),particularly α-linolenic acid and phenylalanine metabolism.Upregulated expression of LOX,ADH1,and PAR genes,together with the increased abundance of their encoded proteins,respectively promoted the accumulation of jasmine lactone,benzyl alcohol,and 2-phenylethanol.These findings indicate that mechanical stress influences the metabolite biosynthesis in tea leaves through coordinated molecular responses.This study provides new insights into the molecular mechanisms underlying tea leaf responses to mechanical stress and a foundation for future investigations into how early molecular events may contribute to post-harvest metabolic changes during oolong tea processing.展开更多
Diplodia tip blight,caused by Diplodia sapinea,is a global pine necrotic disease causing heavy economic losses to the pine industry.Chemical control,its main current management,easily induces pathogen resistance and e...Diplodia tip blight,caused by Diplodia sapinea,is a global pine necrotic disease causing heavy economic losses to the pine industry.Chemical control,its main current management,easily induces pathogen resistance and environmental pollution,which biological control avoids.This study investigated juniper essential oil’s efficacy against the disease on Mongolian Scots pine(Pinus sylvestris var.mongolica)and its induced resistance mechanisms via pot experiments,physiological assays(defense enzyme activities,resistant substances)and metabolomic sequencing(secondary metabolites).Results showed varied efficacy:three foliar sprays of 10μL mL^(-1) oil achieved the best control phenylalanine ammonia-lyase(PAL),polyphenol oxidase(82.9%).The 20μL mL^(-1) treatment significantly increased(PPO)activities,and contents of lignin,flavonoids and total phenolics.Metabolomic analysis showed 326 upregulated and 527 downregulated different metabolites in essential oilinduced and pathogen-inoculated pines,compared to 483 upregulated and 277 downregulated metabolites in noninduced but inoculated pines.The differentially expressed metabolites in treated pines were primarily enriched in pathways related to amino acid metabolism and plant secondary metabolite biosynthesis,with notably increased expression levels of ferulic acid,scopoletin,pipecolic acid,D-proline,and DL-arginine.Therefore,juniper essential oil protects against D.sapinea by inducing systemic acquired resistance in Mongolian Scots pine.In conclusion,juniper essential oil controls D.sapinea by inducing systemic acquired resistance(SAR)in Mongolian Scots pine,clarifying the molecular mechanism and supporting biological control of the disease.展开更多
Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest develop ments and achievements in both theoretical and pr...Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest develop ments and achievements in both theoretical and practical aspects of systems engineering,electronics and related research areas.The journalwelcones high quality original papersfrom a wide range of countries The soope of the journal includes systems engineering military systems,electronic technology,defense eleo tronic technology,control theory and practice,soft-ware algorithm and simulation,reliability,computer development and application,and other topics in all related fields.展开更多
Chinese President Xi Jinping’s New Year message summarized an important year of steady progress as the country prepares to launch its 15th Five-Year Plan.“Our economic strength,scientific and technological abilities...Chinese President Xi Jinping’s New Year message summarized an important year of steady progress as the country prepares to launch its 15th Five-Year Plan.“Our economic strength,scientific and technological abilities,defense capabilities,and composite national strength all reached new heights.”declared President Xi Jinping in his 2026 New Year message on De-By CHINA TODAY cember 31,2025,offering a succinct summary of China’s development over the past year,marked by resilience,progress,and renewed confidence as the country stands at the threshold of a new development phase.展开更多
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr...Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.展开更多
Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Tr...Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation.展开更多
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man...Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.展开更多
文摘Oligosaccharins are potent biomolecules which activate defense responses and resistance in tobacco plants. However, it is not known the systemic behavior of defensive enzymes activated by these elicitors. In this work, the dynamic behavior of key defensive enzymes was evaluated in tobacco plant leaves previously treated through the roots with chitosan polymer (CH), chitosan (COS) and pectic (OGAS) oligosaccharides and Spermine (Sp). All macromolecules tested activated protein levels and defense enzymatic activity in tobacco leaves but with different response dynamics among them and depending on the biochemical variable evaluated. Defense response above control levels were detected since 12 hours after treatments and it consisted in a biphasic behavior with two peaks for PAL (EC 4.3.1.5) and β 1 - 3 glucanase (EC 3.2.1.6) enzymatic activities. The highest enzymatic levels for these enzymes were achieved at 48 hours in plantlets elicited with COS and at 72 hours for those plants treated with chitosan polymer, while the highest POD (EC 1.11.1.6) activity was detected with CH between 48 and 72 hours. These results demonstrated systemic defense activation by oligosaccharins in tobacco whose dynamic of defense response is affected by the kind of oligosaccharins tested. When applying OGAS by foliar spray on tobacco, systemic resistance against Phytoththora nicotianae was induced and plantlets were protected with the low concentration tested by 46% under the bioassays conditions performed. Moreover, enzymatic determinations on roots and leaves previous to plant-pathogen interaction showed increments above 30% of control levels for PAL and POD activities. It means that oligosaccharins activate local and systemic defense responses in plants in the absent of pathogen infection.
基金supported jointly by the earmarked fund for CARS-10-GW2the key research and development program of Hainan Province(Grant No.ZDYF2020226)+1 种基金Collaborative innovation center of Nanfan and high-efficiency tropical agriculture,Hainan University(Grant No.XTCX2022NYC21)funding of Hainan University[Grant No.KYQD(ZR)22123]。
文摘Heat stress hinders the growth and productivity of sweetpotato plants,predominantly through oxidative damage to cellular membranes.Therefore,the development of efficient approaches for mitigating heat-related impairments is essential for the long-term production of sweetpotatoes.Melatonin has been recognised for its capacity to assist plants in dealing with abiotic stress conditions.This research aimed to investigate how different doses of exogenous melatonin influence heat damage in sweetpotato plants.Heat stress drastically affected shoot and root fresh weight by 31.8 and 44.5%,respectively.This reduction resulted in oxidative stress characterised by increased formation of hydrogen peroxide(H_(2)O_(2))by 804.4%,superoxide ion(O_(2)^(·-))by 211.5%and malondialdehyde(MDA)by 234.2%.Heat stress also reduced chlorophyll concentration,photosystemⅡefficiency(F_v/F_m)by 15.3%and gaseous exchange.However,pre-treatment with 100μmol L^(-1)melatonin increased growth and reduced oxidative damage to sweetpotato plants under heat stress.In particular,melatonin decreased H_(2)O_(2),O_(2)^(·-)and MDA by 64.8%,42.7%and 38.2%,respectively.Melatonin also mitigated the decline in chlorophyll levels and improved stomatal traits,gaseous exchange and F_(v)/F_(m)(13%).Results suggested that the favorable outcomes of melatonin treatment can be associated with elevated antioxidant enzyme activity and an increase in non-enzymatic antioxidants and osmo-protectants.Overall,these findings indicate that exogenous melatonin can improve heat stress tolerance in sweetpotatoes.This stu dy will assist re searchers in further investigating how melatonin makes sweetpotatoes more resistant to heat stress.
基金supported by the National Natural Science Foundation of China(62273119).
文摘A cooperative guidance law is proposed in a two-ontwo engagement scenario with large-heading-errors by choosing zero-effort miss distance as a sliding surface,which consists of an attacker,a protector,a defender,and a target,based on fixed-time sliding mode control theory.Based on the nonlinear method of fixed-time sliding mode control,the performance of the cooperative guidance law remains satisfactory even with large-heading-errors scenarios where the linearization-based approaches might be invalid.By virtue of this law,the attacker pursues the target with the assistance of the protector,which can intercept the defender in the engagement scenario.Furthermore,if the attacker is intercepted by the defender,the guidance law of the protector could guarantee that the protector attacks the target.A robust adaptive term is included in the guidance law to deal with the case of the unknown disturbance upper bound of the defender-target team.Finally,the feasibility of the guidance law is verified by nonlinear numerical simulations,and the superiority of it is illustrated by comparing with the linearization guidance law.
文摘Periprosthetic joint infections contribute significantly to patient morbidity,prolonged hospital stays,and escalating healthcare costs.Defensive antibacterial coating(DAC®)hydrogel has emerged as a promising strategy to combat these infections.It forms a biodegradable barrier that reduces bacterial adhesion and can deliver local antibiotics,thereby addressing a key mechanism in biofilm formation.Early clinical evidence suggests that DAC®effectively lowers infection recurrence in revision hip and knee arthroplasties,with additional benefits in trauma procedures and soft tissue repairs.Moreover,it has demonstrated compat-ibility with existing implants and surgical techniques,while potentially reducing overall antibiotic use and hospital stays.Despite these encouraging findings,data for its use in primary arthroplasty remains limited,underscoring the need for large-scale,high-quality studies.Future research is poised to refine DAC®’s antimicrobial efficacy through novel antibiotic combinations,personalised delivery systems,and broader applications beyond lower limb procedures.As the prevalence of comorbidities continues to rise,DAC®represents a valuable addi-tion to multifaceted infection control protocols,potentially transforming ortho-paedic care by enhancing patient outcomes and mitigating the economic and clinical burden of implant-related infections.
文摘The annual average number of snowstorm days in Tongliao area is 1-3 d.Snowstorms mainly happen from October to next May,peaking from December to next March.The incidence is the highest between 12:00 and 15:00.The Mongolian low vortex is the main weather system that triggers snowstorms,and can be classified into three types:small trough development,horizontal trough becoming vertical,and low trough moving eastwards.Snowstorms pose a relatively serious threat to agricultural and animal husbandry production,transportation,power and communication in Tongliao.Especially in spring,snowstorm weather poses a greater threat to agriculture and animal husbandry in Tongliao.It is needed to pay attention to the impact of extreme weather and climate events such as snowstorms,strengthen research on the mechanisms of disaster-causing weather,enhance the early warning capability of disasters,and provide good service guarantees for low-temperature weather in winter.
文摘This paper investigates the number of limit cycles in a predator-prey system with group defense,intially introduced by Wolkowicz and later examined by Rothe and Shafer in the 1980’s.Under the assumption of large prey growth,the system reduces to a perturbed singular system,whose limit cycles can be analyzed using geometric singular perturbation methods-primarily through the study of a slow-divergence integral.Our work completes partially the results previously obtained by Li and Zhu and by Hsu.We provide a comprehensive classification of all possible singular cycles capable of generating limit cycles and analyze the slow-divergence integral for the nine distinct types of cycle families that arise in a canard explosion.Based on these findings,we demonstrate that the maximum number of limit cycles emerging from the singular cycles is two in all cases,thereby confirming conjectures posed by Rothe-Shafer and Xiao-Ruan.
文摘Plants are under constant exposure to varied biotic and abiotic stresses,which significantly affect their growth,productivity,and survival.Biotic stress,caused by pathogens,and abiotic stress,including drought,salinity,extreme temperatures,and heavy metals,activate overlapping yet distinct immune pathways.These are comprised of morphological barriers,hormonal signaling,and the induction of stress-responsive genes through complex pathways mediated by reactive oxygen species(ROS),phytohormones,and secondary metabolites.Abiotic stress triggers organelle-mediated retrograde signaling from organelles like chloroplasts and mitochondria,which causes unfolded protein responses and the regulation of cellular homeostasis.Simultaneously,biotic stress activates both PAMP-triggered immunity(PTI)and effector-triggered immunity(ETI),mediated by salicylic acid(SA),jasmonic acid(JA),and ethylene(ET).This review aims to provide an integrated overview of plant immune responses tomultiple stressors,with emphasis on molecular crosstalk and recent technological interventions.A systematic literature search was conducted using the Scopus database,covering studies published between 2010 and 2025.Advances in CRISPR-Cas genome editing,RNA interference,omics technologies,nanotechnology,and artificial intelligence have improved our knowledge of plant stress physiology and facilitated the design of resilient crop varieties.Despite these advances,the integration of immune signals under simultaneous biotic and abiotic stress remains poorly understood,particularly at tissue-specific and cellular levels.Additionally,practical challenges persist in delivery methods,regulatory hurdles,and long-term field validation.With the escalation of climate change,understanding the complex crosstalk between stress signalling pathways is essential formaintaining sustainable agriculture and global food security.Future directions point toward real-time monitoring tools,such as single-cell omics and spatial transcriptomics,to fine-tune immune responses and support precision crop improvement.
文摘To solve security problems in cross-technology communication(CTC),we take the Internet of Things(IoT)control system as an example,and propose a comprehensive solution against the attack on the physical layer CTC from ZigBee to Wi-Fi.Specifically,we propose a noise interference strategy by adding an appropriate amount of dedicated noise signals,which can interfere with the eavesdropping and simulation of ZigBee signals without affecting the reception of the receiver.Moreover,we also propose a regression modeling strategy which collects data,extracts features,and trains a binary logistic regression model so that the receiver can actively distinguish simulated attack signals.We build the experimental platform by using GNU Radio and USRP devices.Experimental results demonstrate that the security defense strategies can identify and distinguish the signals from the attacker with a high accuracy,effectively solving the signal emulation attack on the physical layer CTC from ZigBee to Wi-Fi.
基金supported in part by the National Science Foundation of China(62373240,62273224,U24A20259).
文摘Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels.
基金Supported by Shaanxi"13115"Public Service Platform Construction Program for Science&Technology Innovation Projects(2010FWPT-17)~~
文摘In order to take advantage of the climate resources more effectively ac- cording to the local circumstances and to plan and develop the citrus industry in Southern Shaanxi more reasonably. On the basis of the investigation of freeze dam- age to citrus occurring in Southern Shaanxi in the winter of 2010, the climatic back- ground for the formation of this freeze damage was analyzed. In combination with the freeze damage indicators during the overwintering period and the harmful accu- mulated cold during the cold wave, indexes for grading the freeze damage in southern Shaanxi were analyzed and verified, and the perspective of grading the freeze damage using the harmful accumulated cold during the cold wave was also presented. Through analyzing the extremely lowest temperature and the harmful ac- cumulated cold in the winter of 2010 and in history at 12 citrus growing counties (districts) in Ankang area and Hanzhong area, the reasons why the freeze damage to citrus during the overwintering period was severer in the west than in the east of Southern Shaanxi were discussed, and the results obtained were basically consistent with the actual situation observed from investigation. Finally, defensive countermea- sures against the freeze damage to citrus during the overwintering period were put forward from several aspects.
文摘At evaluating the combat effectiveness of the defense system, target′s probability to penetrate the defended area is a primary care taking index. In this paper, stochastic model to compete the probability that target penetrates the defended area along any flight path is established by the state analysis and statistical equilibrium analysis of stochastic service system theory. The simulated annealing algorithm is an enlightening random search method based on Monte Carlo recursion, and it can find global optimal solution by simulating annealing process. Combining stochastic model to compete the probability and simulated annealing algorithm, this paper establishes the method to solve problem quantitatively about combat configuration optimization of weapon systems. The calculated result shows that the perfect configuration for fire cells of the weapon is fast found by using this method, and this quantificational method for combat configuration is faster and more scientific than previous one based on principle via map fire field.
基金Supported by Research Fund of the State Tobacco Monopoly Bureau(110201002002)the Open Research Project of Key Laboratory of Tobacco Genetics and Breeding in the Tobacco Industry(TB201006)~~
文摘[Objective] This study aimed to explore the effects of spores and crude toxins of Helminthosporium gramineum Rabenh f. sp. echinochloae(HGE) on the ac- tivity of defensive enzymes of barnyardgrass [Echinochloa crus-galli (L.) Beauv.]. [Method] The effects of spores and crude toxins of HGE, as well as the mixture of spores and crude toxins on the activity of defensive enzymes in barnyardgrass were determined under laboratory conditions. [Result] Spores and crude toxins of HGE had varying degrees of effects on PAL and POD activity, and no obvious effect on SOD activity in barnyardgrass. In addition, spores and toxins had some similar im- pacts on the defensive enzymes in barnyardgrass. [Conclusion] Since toxins have similar effects on the hosts as spores of fungal pathogen do, they can be a substi- tute for the fungal pathogen in studying the partial pathogenic mechanism of this pathogen due to its complexity in pathogenic process.
文摘The performance of deep recommendation models degrades significantly under data poisoning attacks.While adversarial training methods such as Vulnerability-Aware Training(VAT)enhance robustness by injecting perturbations into embeddings,they remain limited by coarse-grained noise and a static defense strategy,leaving models susceptible to adaptive attacks.This study proposes a novel framework,Self-Purification Data Sanitization(SPD),which integrates vulnerability-aware adversarial training with dynamic label correction.Specifically,SPD first identifies high-risk users through a fragility scoring mechanism,then applies self-purification by replacing suspicious interactions with model-predicted high-confidence labels during training.This closed-loop process continuously sanitizes the training data and breaks the protection ceiling of conventional adversarial training.Experiments demonstrate that SPD significantly improves the robustness of both Matrix Factorization(MF)and LightGCN models against various poisoning attacks.We show that SPD effectively suppresses malicious gradient propagation and maintains recommendation accuracy.Evaluations on Gowalla and Yelp2018 confirmthat SPD-trainedmodels withstandmultiple attack strategies—including Random,Bandwagon,DP,and Rev attacks—while preserving performance.
基金supported by the National Key Research and Development Program of China(2022YFD2101101)the Earmarked Fund for CARS-19+2 种基金the National Natural Science Foundation of China(32402634)the Modern Agricultural(Tea)Industry Technology System of Fujian Province,China(2025 No.593)the Special Fund for Science and Technology Innovation of Fujian Zhang Tianfu Tea Development Foundation,China(FJZTF01)。
文摘Understanding the molecular responses of tea leaves to mechanical stress is crucial for elucidating the mechanisms of post-harvest quality formation during oolong tea processing.This study employed an integrated multi-omics strategy to characterize the changes and interactions among metabolomic(MB),transcriptomic(TX),and proteomic(PT)profiles in mechanically stressed tea leaves.Mechanical stress initially activated damage-associated molecular patterns(DAMPs),including Ca^(2+)signaling,jasmonic acid signaling,and glutathione metabolism pathways.These processes subsequently induced quality-related metabolic pathways(QRMPs),particularly α-linolenic acid and phenylalanine metabolism.Upregulated expression of LOX,ADH1,and PAR genes,together with the increased abundance of their encoded proteins,respectively promoted the accumulation of jasmine lactone,benzyl alcohol,and 2-phenylethanol.These findings indicate that mechanical stress influences the metabolite biosynthesis in tea leaves through coordinated molecular responses.This study provides new insights into the molecular mechanisms underlying tea leaf responses to mechanical stress and a foundation for future investigations into how early molecular events may contribute to post-harvest metabolic changes during oolong tea processing.
基金supported by the National Key R&D Program of China(2022YFD1401005).
文摘Diplodia tip blight,caused by Diplodia sapinea,is a global pine necrotic disease causing heavy economic losses to the pine industry.Chemical control,its main current management,easily induces pathogen resistance and environmental pollution,which biological control avoids.This study investigated juniper essential oil’s efficacy against the disease on Mongolian Scots pine(Pinus sylvestris var.mongolica)and its induced resistance mechanisms via pot experiments,physiological assays(defense enzyme activities,resistant substances)and metabolomic sequencing(secondary metabolites).Results showed varied efficacy:three foliar sprays of 10μL mL^(-1) oil achieved the best control phenylalanine ammonia-lyase(PAL),polyphenol oxidase(82.9%).The 20μL mL^(-1) treatment significantly increased(PPO)activities,and contents of lignin,flavonoids and total phenolics.Metabolomic analysis showed 326 upregulated and 527 downregulated different metabolites in essential oilinduced and pathogen-inoculated pines,compared to 483 upregulated and 277 downregulated metabolites in noninduced but inoculated pines.The differentially expressed metabolites in treated pines were primarily enriched in pathways related to amino acid metabolism and plant secondary metabolite biosynthesis,with notably increased expression levels of ferulic acid,scopoletin,pipecolic acid,D-proline,and DL-arginine.Therefore,juniper essential oil protects against D.sapinea by inducing systemic acquired resistance in Mongolian Scots pine.In conclusion,juniper essential oil controls D.sapinea by inducing systemic acquired resistance(SAR)in Mongolian Scots pine,clarifying the molecular mechanism and supporting biological control of the disease.
文摘Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest develop ments and achievements in both theoretical and practical aspects of systems engineering,electronics and related research areas.The journalwelcones high quality original papersfrom a wide range of countries The soope of the journal includes systems engineering military systems,electronic technology,defense eleo tronic technology,control theory and practice,soft-ware algorithm and simulation,reliability,computer development and application,and other topics in all related fields.
文摘Chinese President Xi Jinping’s New Year message summarized an important year of steady progress as the country prepares to launch its 15th Five-Year Plan.“Our economic strength,scientific and technological abilities,defense capabilities,and composite national strength all reached new heights.”declared President Xi Jinping in his 2026 New Year message on De-By CHINA TODAY cember 31,2025,offering a succinct summary of China’s development over the past year,marked by resilience,progress,and renewed confidence as the country stands at the threshold of a new development phase.
文摘Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.
文摘Adversarial Reinforcement Learning(ARL)models for intelligent devices and Network Intrusion Detection Systems(NIDS)improve systemresilience against sophisticated cyber-attacks.As a core component of ARL,Adversarial Training(AT)enables NIDS agents to discover and prevent newattack paths by exposing them to competing examples,thereby increasing detection accuracy,reducing False Positives(FPs),and enhancing network security.To develop robust decision-making capabilities for real-world network disruptions and hostile activity,NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity.The accuracy and timeliness of the IDS were crucial to the network’s availability and reliability at this time.This paper analyzes ARL applications in NIDS,revealing State-of-The-Art(SoTA)methodology,issues,and future research prospects.This includes Reinforcement Machine Learning(RML)-based NIDS,which enables an agent to interact with the environment to achieve a goal,andDeep Reinforcement Learning(DRL)-based NIDS,which can solve complex decision-making problems.Additionally,this survey study addresses cybersecurity adversarial circumstances and their importance for ARL and NIDS.Architectural design,RL algorithms,feature representation,and training methodologies are examined in the ARL-NIDS study.This comprehensive study evaluates ARL for intelligent NIDS research,benefiting cybersecurity researchers,practitioners,and policymakers.The report promotes cybersecurity defense research and innovation.
基金supported by 2023 Higher Education Scientific Research Planning Project of China Society of Higher Education(No.23PG0408)2023 Philosophy and Social Science Research Programs in Jiangsu Province(No.2023SJSZ0993)+2 种基金Nantong Science and Technology Project(No.JC2023070)Key Project of Jiangsu Province Education Science 14th Five-Year Plan(Grant No.B-b/2024/02/41)the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202407).
文摘Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs.