Retaining the death penalty and strict restricting the application of the death penalty is now a basic criminal policy in China, and from the judicial level, the key to the restriction of the death penalty is to study...Retaining the death penalty and strict restricting the application of the death penalty is now a basic criminal policy in China, and from the judicial level, the key to the restriction of the death penalty is to study what lenient sentencing discretion the criminal has to constitute "not to execute immediately" when he has reached the standard of the immediate execution of the death penalty, to cross the chasm from the immediate execution of the death penalty to the death sentence with a reprieve. The basic process of the sentencing is to establish a baseline punishment on the basis of the social harmfulness of the activities of the criminal, and then measure the profits and losses according to the offender's personal danger. Therefore, although the social harmfulness of the activities of the criminal reaches the standard of the "most heinous crimes", due to the existence of the fault of the victim, active compensation for the victim, and the motives of the small blames and other lenient sentencing discretions, the criminal's danger has not reached the degree of "flagrance". Apply the death sentence with a two-year reprieve and even the life imprisonment generally. If there are some strict sentencing discretions, such as "the crime means is extremely cruel", carefully consider the use of the immediate execution of the death penalty. Under the circumstances of the concurrence of the sentencing, carry on the overall consideration based on the comprehensive measurement of various circumstances of the sentencing.展开更多
Oxidative post-translational modifications of specific chloroplast proteins contribute to the initiation of retrograde signaling.The Arabidopsis thaliana EXECUTER1(EX1)protein,a chloroplast-localized singlet oxygen(^(...Oxidative post-translational modifications of specific chloroplast proteins contribute to the initiation of retrograde signaling.The Arabidopsis thaliana EXECUTER1(EX1)protein,a chloroplast-localized singlet oxygen(^(1)O_(2))sensor,undergoes tryptophan(Trp)643 oxidation by^(1)O_(2),a chloroplast-derived and light-dependent reactive oxygen species.The indole side chain of Trp is vulnerable to^(1)O_(2),leading to the generation of oxidized Trp variants and priming EX1 for degradation by a membrane-bound FtsH protease.The perception of^(1)O_(2)via Trp643 oxidation and subsequent EX1 proteolysis facilitate chloroplast-to-nucleus retrograde signaling.In this study,we discovered that the EX1-like protein EX2 also undergoes^(1)O_(2)-dependent Trp530 oxidation and FtsH-dependent turnover,which attenuates^(1)O_(2)signaling by decelerating EX1-Trp643 oxidation and subsequent EX1 degradation.Consistent with this finding,the loss of EX2 function reinforces EX1-dependent retrograde signaling by accelerating EX1-Trp643 oxidation and subsequent EX1 proteolysis,whereas overexpression of EX2 produces molecular phenotypes opposite to those observed in the loss-of-function mutants of EX2.Intriguingly,phylogenetic analysis suggests that EX2 may have emerged evolutionarily to attenuate the sensitivity of EX1 toward^(1)O_(2).Collectively,these results suggest that EX2 functions as a negative regulator of the EX1 signalosome through its own^(1)O_(2)-dependent oxidation,providing a new mechanistic insight into the regulation of EX1-mediated^(1)O_(2)signaling.展开更多
Chloroplast development depends on the synthesis and import of a large number of nuclear-encoded pro- teins. The synthesis of some of these proteins is affected by the functional state of the plastid via a process kno...Chloroplast development depends on the synthesis and import of a large number of nuclear-encoded pro- teins. The synthesis of some of these proteins is affected by the functional state of the plastid via a process known as retrograde signaling. Retrograde plastid-to-nucleus signaling has been often characterized in seedlings of Arabidopsis thaliana exposed to norflurazon (NF), an inhibitor of carotenoid biosynthesis. Results of this work suggested that, throughout seedling development, a factor is released from the plastid to the cytoplasm that indicates a perturbation of plastid homeostasis and represses nuclear genes required for normal chloroplast development. The identity of this factor is still under debate. Reactive oxygen species (ROS) were among the candidates discussed as possible retrograde signals in NF-treated plants. In the present work, this proposed role of ROS has been analyzed. In seedlings grown from the very beginning in the presence of NF, ROS-dependent signaling was not detectable, whereas, in seedlings first exposed to NF after light-dependent chloroplast formation had been completed, enhanced ROS production occurred and, among oth- ers, 1O2-mediated and EXECUTER-dependent retrograde signaling was induced. Hence, depending on the developmental stage at which plants are exposed to NF, different retrograde signaling pathways may be activated, some of which are also active in non-treated plants under light stress.展开更多
Human genome encodes six paralogous gasdermin genes:GSDMA,GSDMB,GSDMC,GSDMD,GSDME and DFNB59.1 Proteolytic cleavage of these gasdermin proteins liberates an N-terminal(NT)fragment from autoinhibition,which assembles i...Human genome encodes six paralogous gasdermin genes:GSDMA,GSDMB,GSDMC,GSDMD,GSDME and DFNB59.1 Proteolytic cleavage of these gasdermin proteins liberates an N-terminal(NT)fragment from autoinhibition,which assembles in membrane to form pores and execute pyroptotic cell death in general.1 In contrast to other gasdermins,gasdermin B(GSDMB)is the only gasdermin gene that has not been identified in rodents.Zhou et al first shed light on the molecular mechanism by which cytotoxic lymphocyte-derived granzyme A(GZMA)cleaves GSDMB to execute pyroptosis in GSDMB-positive cells,especially in cancer cells.2 In this issue of Cell,Hansen et al reported a dynamic host pathogen S.flexneri prevents GSDMB-mediated lysis by secreting IpaH7.8,which targets and ubiquitinates GSDMB for 26S proteasome destruction.3 They showed that GSDMB implements bacteriocidic ability by recognition of the phospholipids on Gram-negative bacterial membranes rather than lysing host cells.Although their experimental design and data are clearly presented and straightforward,there are still some doubts to be clarified.展开更多
In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their ...In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their safe operation,robust verificationmethods are required to ensure their correctness.As one of the formalmethods,symbolic execution offers a viable approach for verifying programmable networks by systematically exploring all possible paths within a program.However,its application in this field encounters scalability issues due to path explosion and complex constraint-solving.Therefore,in this paper,we propose NetVerifier,a scalable verification system for programmable networks.Tomitigate the path explosion issue,we developmultiple pruning strategies that strategically eliminate irrelevant execution paths while preserving verification integrity by precisely identifying the execution paths related to the verification purpose.To address the complex constraint-solving problem,we introduce an execution results reuse solution to avoid redundant computation of the same constraints.To apply these solutions intelligently,a matching algorithm is implemented to automatically select appropriate solutions based on the characteristics of the verification requirement.Moreover,Language Aided Verification(LAV),an assertion language,is designed to express verification intentions in a concise form.Experimental results on diverse open-source programs of varying scales demonstrate NetVerifier’s improvement in scalability and effectiveness in identifying potential network errors.In the best scenario,compared with ASSERT-P4,NetVerifier reduced the execution path,verification time,and memory occupation of the verification process by 99.92%,94.76%,and 65.19%,respectively.展开更多
Exploring the mechanisms underlying willingness to buy(WTB)will help us identify neural indicators for predicting the performance of innovative products.Using functional magnetic resonance imaging,we asked participant...Exploring the mechanisms underlying willingness to buy(WTB)will help us identify neural indicators for predicting the performance of innovative products.Using functional magnetic resonance imaging,we asked participants to view products created by combining two components,including high applicability new combinations(HANCs),which provide a novel and practical application;and low applicability new combinations(LANCs),which provide no additional value.First,we found that WTB generally involves activation of the parahippocampal gyrus.For HANC,activation in the pars opercularis of the inferior frontal gyrus(IFG oper)is associated with WTB.Second,representational similarity analysis revealed that for HANC,the interrelation between the elements and combinations in the IFG oper predicts WTB.Third,multivoxel pattern analysis found that classification accuracy in the IFG oper predicts the difference in WTB between HANCs and LANCs.In conclusion,WTB requires default mode network-based associative processing.For HANC products,executive control network-based processes are necessary for value construction.展开更多
Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequ...Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequently,the academic community has devoted increasing attention to these security risks.However,conventional approaches to vulnerability detection frequently exhibit limited accuracy.To address this limitation,the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks(GNNs).The proposedmethod first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts.These graphs are subsequently processed using GNNs to efficiently identify contracts with a high likelihood of vulnerabilities.For these high-risk contracts,symbolic execution is employed to perform fine-grained,path-level analysis,thereby improving overall detection precision.Experimental results on a dataset comprising 10,079 contracts demonstrate that the proposed method achieves detection precisions of 93.58% for reentrancy vulnerabilities and 92.73% for timestamp-dependent vulnerabilities.展开更多
Jinzhou New China Dragon(Group)Indus-trial Co.,Ltd.(JNCDGICL)plans to to-tally invest RMB300 million to construct amolybdenum mining and deep processing project.It will
Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relation...Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level.展开更多
BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration ...BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration of combined antidepressant therapy,significant improvement is still difficult to achieve.At present,electroconvulsive therapy(ECT)remains a clinically effective method for treating refractory depression.A good anesthesia regimen can enhance its clinical efficacy.Actively exploring high-quality anesthesia regimens has become a current research hotspot.AIM To explore the effect of esketamine and etomidate anesthesia on the clinical efficacy of ECT for TRD.METHODS A total of 120 patients with TRD,treated at the Department of Psychiatry,The Second Affiliated Hospital of Shandong First Medical University,China between April 2020 and April 2024,were selected for the study.The patients were allocated at random into two groups using a random number table:The combination and control groups,with 60 patients in each group.Both groups underwent ECT;the combination group received esketamine and etomidate anesthesia,while the control group received etomidate anesthesia.The following parameters were compared between the two groups:Heart rate(HR);mean arterial pressure(MAP);peripheral capillary oxygen saturation(SpO2);initial and final threshold charges;and serum brain-derived neurotrophic factor(BDNF),nerve growth factor(NGF),5-hydroxytryptamine(5-HT),and interleukin-4(IL-4)levels.Neurological functions,basic executive function scores,and adverse reactions were compared during the treatment process.RESULTS During treatment,the maximum and minimum HR and MAP values in the combination group were markedly lower than those in the control group(P<0.05),whereas there was no significant difference in SpO2 between the two groups(P>0.05).During the treatment,there were no significant differences in the initial threshold charge and average duration of seizures during ECT between the two groups(P>0.05).However,the final threshold charge and total charge in the combination group were considerably lower than those in the control group(P<0.05).After treatment,the BDNF,NGF,5-HT,and IL-4 levels were evidently higher in the combination group than in the control group(P<0.05).During treatment,as the number of ECT sessions increased,both BRNAS and Measurement and Treatment Research to Improve Cognition in Schizophrenia Consensus Cognitive Battery(MCCB)scores increased,whereas Hamilton Depression Rating Scale(HAMD)-24 scores decreased in both groups.Starting from the third treatment session,the BRNAS and MCCB scores in the combination group were higher than in the control group,whereas the Hamilton Depression Scale-24 score was lower in the combination group than in the control group(P<0.05).After treatment,the Wisconsin Card Sorting Test scores and Tower of Hanoi test results in the combination group were significantly better than those in the control group(P<0.05).The occurrence of adverse reactions was compared between the two groups(P>0.05).CONCLUSION Esketamine and etomidate anesthesia during ECT for patients with TRD helps maintain stable vital signs during the treatment process,improves depressive symptoms,and enhances neurological and basic executive functions.展开更多
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef...Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments.展开更多
Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They cons...Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management.展开更多
As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing tradition...As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing traditional working modes but also profoundly impacting the application of laws,evidence collection,trial process,and execution.Digital technologies can remedy many shortcomings in traditional judicial procedures,better protecting the legitimate rights and interests of people,especially people with disabilities.展开更多
The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often negle...The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance.This research applies deep learning to malware detection,using Convolutional Neural Network(CNN)architectures adapted to work with semantically extracted data to classify malware into malware families.Starting from the Malconv model,this study introduces modifications to adapt it to multi-classification tasks and improve its performance.It proposes a new innovative method that focuses on byte extraction from Portable Executable(PE)malware files based on their semantic location,resulting in higher accuracy in malware classification than traditional methods using full-byte sequences.This novel approach evaluates the importance of each semantic segment to improve classification accuracy.The results revealed that the header segment of PE files provides the most valuable information for malware identification,outperforming the other sections,and achieving an average classification accuracy of 99.54%.The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy.展开更多
Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,ma...Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,many enterprises suffer serious losses without compliance management,especially import and export enterprises,which are forced to exit the market due to poor compliance management.This article is based on the urgent need of Chinese enterprises for compliance management,but the lack of research by scholars.It summarizes the literature on the factors affecting compliance,hoping to be helpful for the study of compliance management.展开更多
文摘Retaining the death penalty and strict restricting the application of the death penalty is now a basic criminal policy in China, and from the judicial level, the key to the restriction of the death penalty is to study what lenient sentencing discretion the criminal has to constitute "not to execute immediately" when he has reached the standard of the immediate execution of the death penalty, to cross the chasm from the immediate execution of the death penalty to the death sentence with a reprieve. The basic process of the sentencing is to establish a baseline punishment on the basis of the social harmfulness of the activities of the criminal, and then measure the profits and losses according to the offender's personal danger. Therefore, although the social harmfulness of the activities of the criminal reaches the standard of the "most heinous crimes", due to the existence of the fault of the victim, active compensation for the victim, and the motives of the small blames and other lenient sentencing discretions, the criminal's danger has not reached the degree of "flagrance". Apply the death sentence with a two-year reprieve and even the life imprisonment generally. If there are some strict sentencing discretions, such as "the crime means is extremely cruel", carefully consider the use of the immediate execution of the death penalty. Under the circumstances of the concurrence of the sentencing, carry on the overall consideration based on the comprehensive measurement of various circumstances of the sentencing.
基金This research was supported by the Strategic Priority Research Program from the Chinese Academy of Sciences(grant no.XDB27040102)the 100-Talent Program of the Chinese Academy of Sciences and the National Natural Science Foundation of China(NSFC)(grant no.31871397)to C.K.Support from a President's International Fellowship Initiative(PIFI)postdoctoral fellowship from the Chinese Academy of Sciences(no.2019PB0066)to V.D.is also acknowledged.
文摘Oxidative post-translational modifications of specific chloroplast proteins contribute to the initiation of retrograde signaling.The Arabidopsis thaliana EXECUTER1(EX1)protein,a chloroplast-localized singlet oxygen(^(1)O_(2))sensor,undergoes tryptophan(Trp)643 oxidation by^(1)O_(2),a chloroplast-derived and light-dependent reactive oxygen species.The indole side chain of Trp is vulnerable to^(1)O_(2),leading to the generation of oxidized Trp variants and priming EX1 for degradation by a membrane-bound FtsH protease.The perception of^(1)O_(2)via Trp643 oxidation and subsequent EX1 proteolysis facilitate chloroplast-to-nucleus retrograde signaling.In this study,we discovered that the EX1-like protein EX2 also undergoes^(1)O_(2)-dependent Trp530 oxidation and FtsH-dependent turnover,which attenuates^(1)O_(2)signaling by decelerating EX1-Trp643 oxidation and subsequent EX1 degradation.Consistent with this finding,the loss of EX2 function reinforces EX1-dependent retrograde signaling by accelerating EX1-Trp643 oxidation and subsequent EX1 proteolysis,whereas overexpression of EX2 produces molecular phenotypes opposite to those observed in the loss-of-function mutants of EX2.Intriguingly,phylogenetic analysis suggests that EX2 may have emerged evolutionarily to attenuate the sensitivity of EX1 toward^(1)O_(2).Collectively,these results suggest that EX2 functions as a negative regulator of the EX1 signalosome through its own^(1)O_(2)-dependent oxidation,providing a new mechanistic insight into the regulation of EX1-mediated^(1)O_(2)signaling.
文摘Chloroplast development depends on the synthesis and import of a large number of nuclear-encoded pro- teins. The synthesis of some of these proteins is affected by the functional state of the plastid via a process known as retrograde signaling. Retrograde plastid-to-nucleus signaling has been often characterized in seedlings of Arabidopsis thaliana exposed to norflurazon (NF), an inhibitor of carotenoid biosynthesis. Results of this work suggested that, throughout seedling development, a factor is released from the plastid to the cytoplasm that indicates a perturbation of plastid homeostasis and represses nuclear genes required for normal chloroplast development. The identity of this factor is still under debate. Reactive oxygen species (ROS) were among the candidates discussed as possible retrograde signals in NF-treated plants. In the present work, this proposed role of ROS has been analyzed. In seedlings grown from the very beginning in the presence of NF, ROS-dependent signaling was not detectable, whereas, in seedlings first exposed to NF after light-dependent chloroplast formation had been completed, enhanced ROS production occurred and, among oth- ers, 1O2-mediated and EXECUTER-dependent retrograde signaling was induced. Hence, depending on the developmental stage at which plants are exposed to NF, different retrograde signaling pathways may be activated, some of which are also active in non-treated plants under light stress.
基金The work was supported by the National Natural Science Foundation of China(No.82072223)Scientific Research Foundation of Graduate School of Southeast University(No.YBPY2172)+1 种基金333 High Level Talents Training Project of Jiangsu Province(No.BRA2019011)General Project of Military Logistics Research(No.CLB19J025).
文摘Human genome encodes six paralogous gasdermin genes:GSDMA,GSDMB,GSDMC,GSDMD,GSDME and DFNB59.1 Proteolytic cleavage of these gasdermin proteins liberates an N-terminal(NT)fragment from autoinhibition,which assembles in membrane to form pores and execute pyroptotic cell death in general.1 In contrast to other gasdermins,gasdermin B(GSDMB)is the only gasdermin gene that has not been identified in rodents.Zhou et al first shed light on the molecular mechanism by which cytotoxic lymphocyte-derived granzyme A(GZMA)cleaves GSDMB to execute pyroptosis in GSDMB-positive cells,especially in cancer cells.2 In this issue of Cell,Hansen et al reported a dynamic host pathogen S.flexneri prevents GSDMB-mediated lysis by secreting IpaH7.8,which targets and ubiquitinates GSDMB for 26S proteasome destruction.3 They showed that GSDMB implements bacteriocidic ability by recognition of the phospholipids on Gram-negative bacterial membranes rather than lysing host cells.Although their experimental design and data are clearly presented and straightforward,there are still some doubts to be clarified.
基金supported by the National Key Research and Development Program of China under Grant 2023YFB2903902in part by the Science and Technology Innovation Leading Talents Subsidy Project of Central Plains under Grant 244200510038.
文摘In the process of programmable networks simplifying network management and increasing network flexibility through custom packet behavior,security incidents caused by human logic errors are seriously threatening their safe operation,robust verificationmethods are required to ensure their correctness.As one of the formalmethods,symbolic execution offers a viable approach for verifying programmable networks by systematically exploring all possible paths within a program.However,its application in this field encounters scalability issues due to path explosion and complex constraint-solving.Therefore,in this paper,we propose NetVerifier,a scalable verification system for programmable networks.Tomitigate the path explosion issue,we developmultiple pruning strategies that strategically eliminate irrelevant execution paths while preserving verification integrity by precisely identifying the execution paths related to the verification purpose.To address the complex constraint-solving problem,we introduce an execution results reuse solution to avoid redundant computation of the same constraints.To apply these solutions intelligently,a matching algorithm is implemented to automatically select appropriate solutions based on the characteristics of the verification requirement.Moreover,Language Aided Verification(LAV),an assertion language,is designed to express verification intentions in a concise form.Experimental results on diverse open-source programs of varying scales demonstrate NetVerifier’s improvement in scalability and effectiveness in identifying potential network errors.In the best scenario,compared with ASSERT-P4,NetVerifier reduced the execution path,verification time,and memory occupation of the verification process by 99.92%,94.76%,and 65.19%,respectively.
基金supported by the National Natural Science Foundation of China(32271097)the Major Project of the National Social Science Foundation of China(19ZDA043).
文摘Exploring the mechanisms underlying willingness to buy(WTB)will help us identify neural indicators for predicting the performance of innovative products.Using functional magnetic resonance imaging,we asked participants to view products created by combining two components,including high applicability new combinations(HANCs),which provide a novel and practical application;and low applicability new combinations(LANCs),which provide no additional value.First,we found that WTB generally involves activation of the parahippocampal gyrus.For HANC,activation in the pars opercularis of the inferior frontal gyrus(IFG oper)is associated with WTB.Second,representational similarity analysis revealed that for HANC,the interrelation between the elements and combinations in the IFG oper predicts WTB.Third,multivoxel pattern analysis found that classification accuracy in the IFG oper predicts the difference in WTB between HANCs and LANCs.In conclusion,WTB requires default mode network-based associative processing.For HANC products,executive control network-based processes are necessary for value construction.
基金supported by the National Key Research and Development Program of China(2020YFB1005704).
文摘Since the advent of smart contracts,security vulnerabilities have remained a persistent challenge,compromsing both the reliability of contract execution and the overall stability of the virtual currency market.Consequently,the academic community has devoted increasing attention to these security risks.However,conventional approaches to vulnerability detection frequently exhibit limited accuracy.To address this limitation,the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks(GNNs).The proposedmethod first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts.These graphs are subsequently processed using GNNs to efficiently identify contracts with a high likelihood of vulnerabilities.For these high-risk contracts,symbolic execution is employed to perform fine-grained,path-level analysis,thereby improving overall detection precision.Experimental results on a dataset comprising 10,079 contracts demonstrate that the proposed method achieves detection precisions of 93.58% for reentrancy vulnerabilities and 92.73% for timestamp-dependent vulnerabilities.
文摘Jinzhou New China Dragon(Group)Indus-trial Co.,Ltd.(JNCDGICL)plans to to-tally invest RMB300 million to construct amolybdenum mining and deep processing project.It will
基金supported in part by the National Natural Science Foundation of China under Grant No.72264036,in part by the West Light Foundation of The Chinese Academy of Sciences under Grant No.2020-XBQNXZ-020Xinjiang University of Finance and Economics Postgraduate Innovation Project XJUFE2024K036.
文摘Purpose:Currently,different research conclusions exist about the relationship between relational capital and corporate innovation.The research aims to(1)reveal the actual relationship between executive alumni relations and firm innovation performance,(2)examine the moderating role of executive academic backgrounds,(3)analyze the paths for firms to leverage knowledge spillovers from regional universities to promote firm innovation by their geographic location.Design/methodology/approach:A social network approach is used to construct alumni relationship networks of A-share listed companies in Shanghai and Shenzhen,China.A two-way fixed effects model is used to assess the impact of firms’structural position in executive alumni networks on firms’innovation performance.In addition,the research also delves into the interactions between knowledge spillovers from geographic locations and executives’alumni networks,aiming to elucidate their combined effects on firms’innovation performance.Findings:This paper explores the curvilinear relationship between executive alumni networks’centrality and firm innovation within the Chinese context.It also finds that in the positive effect interval on the right side of the“U-shaped,”the industry with the highest number of occurrences is the high-tech industry.Moreover,it elucidates the moderating influence of executives’academic experience on the alumni networks-innovation nexus,offering a nuanced understanding of these dynamics.Lastly,we provide novel insights into optimizing resource allocation to leverage geographic knowledge spillovers for innovation.Research limitations:The study may not fully represent the broader population of firms,particularly small and medium-sized enterprises(SMEs)or unlisted companies.Future research could expand the sample to include a more diverse range of firms to enhance the generalizability of the findings.Practical implications:Firstly,companies can give due consideration to the alumni resources of executives in their personnel decisions,but they should pay attention to the rational use of resources.Secondly,universities should actively work with companies to promote knowledge transfer and collaboration.Originality/value:The findings help clarify the influence mechanism of firms’innovation performance,providing theoretical support and empirical evidence for firms to drive innovation at the executive alumni relationship network level.
文摘BACKGROUND Treatment-resistant depression(TRD)has a poor response to clinical treatment.Patients with TRD do not respond adequately to standard antidepressants.Even after receiving a full dose and sufficient duration of combined antidepressant therapy,significant improvement is still difficult to achieve.At present,electroconvulsive therapy(ECT)remains a clinically effective method for treating refractory depression.A good anesthesia regimen can enhance its clinical efficacy.Actively exploring high-quality anesthesia regimens has become a current research hotspot.AIM To explore the effect of esketamine and etomidate anesthesia on the clinical efficacy of ECT for TRD.METHODS A total of 120 patients with TRD,treated at the Department of Psychiatry,The Second Affiliated Hospital of Shandong First Medical University,China between April 2020 and April 2024,were selected for the study.The patients were allocated at random into two groups using a random number table:The combination and control groups,with 60 patients in each group.Both groups underwent ECT;the combination group received esketamine and etomidate anesthesia,while the control group received etomidate anesthesia.The following parameters were compared between the two groups:Heart rate(HR);mean arterial pressure(MAP);peripheral capillary oxygen saturation(SpO2);initial and final threshold charges;and serum brain-derived neurotrophic factor(BDNF),nerve growth factor(NGF),5-hydroxytryptamine(5-HT),and interleukin-4(IL-4)levels.Neurological functions,basic executive function scores,and adverse reactions were compared during the treatment process.RESULTS During treatment,the maximum and minimum HR and MAP values in the combination group were markedly lower than those in the control group(P<0.05),whereas there was no significant difference in SpO2 between the two groups(P>0.05).During the treatment,there were no significant differences in the initial threshold charge and average duration of seizures during ECT between the two groups(P>0.05).However,the final threshold charge and total charge in the combination group were considerably lower than those in the control group(P<0.05).After treatment,the BDNF,NGF,5-HT,and IL-4 levels were evidently higher in the combination group than in the control group(P<0.05).During treatment,as the number of ECT sessions increased,both BRNAS and Measurement and Treatment Research to Improve Cognition in Schizophrenia Consensus Cognitive Battery(MCCB)scores increased,whereas Hamilton Depression Rating Scale(HAMD)-24 scores decreased in both groups.Starting from the third treatment session,the BRNAS and MCCB scores in the combination group were higher than in the control group,whereas the Hamilton Depression Scale-24 score was lower in the combination group than in the control group(P<0.05).After treatment,the Wisconsin Card Sorting Test scores and Tower of Hanoi test results in the combination group were significantly better than those in the control group(P<0.05).The occurrence of adverse reactions was compared between the two groups(P>0.05).CONCLUSION Esketamine and etomidate anesthesia during ECT for patients with TRD helps maintain stable vital signs during the treatment process,improves depressive symptoms,and enhances neurological and basic executive functions.
基金funded by the Science and Technology Project of State Grid Jiangsu Electric Power Company Ltd.,grant number J2024169.
文摘Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments.
文摘Introduction: Stroke may have a negative impact on mental health and behavior. Cognitive disorders are common after stroke. They are rarely assessed in current clinical practice, particularly in our context. They constitute a real “invisible” handicap. In sub-Saharan Africa, we are not aware of any studies specifically assessing executive functions. These functions are at the heart of all adaptation processes to new or complex situations. This prompted the authors to carry out this study at the Ibrahima Pierre Ndiaye Neuroscience Department of the Fann National University Hospital Centre (Senegal). Objective and Methodology: The aim of this study was to assess and characterize post-stroke alterations in executive functions in our context. We conducted a descriptive cross-sectional study. It took place over a 4-month period from April 1 to August 31, 2021. Patients were matched to controls according to age, gender and educational level. Executive functions were assessed using the Frontal Assessment Battery (FAB). Results: A total of 30 patients with stroke were enrolled. These patients were matched to controls. The mean age of the patients was 46.87 ± 17.65 years. For the control group, it was 39.27 ± 12.33 years. The prevalence of executive function disorders was 20% in post-stroke patients. The majority of executive functions assessed were impaired. Sensitivity to interference and environmental autonomy were the only ones preserved. Conclusion: Impaired executive functions are common after stroke. They should be systematically assessed in all stroke patients to ensure optimal management.
文摘As digital technology grows,it will improve accessibility to justice and legal protection for the differently abled and promote social justice.THE rapid development of digital technology is not only changing traditional working modes but also profoundly impacting the application of laws,evidence collection,trial process,and execution.Digital technologies can remedy many shortcomings in traditional judicial procedures,better protecting the legitimate rights and interests of people,especially people with disabilities.
文摘The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance.This research applies deep learning to malware detection,using Convolutional Neural Network(CNN)architectures adapted to work with semantically extracted data to classify malware into malware families.Starting from the Malconv model,this study introduces modifications to adapt it to multi-classification tasks and improve its performance.It proposes a new innovative method that focuses on byte extraction from Portable Executable(PE)malware files based on their semantic location,resulting in higher accuracy in malware classification than traditional methods using full-byte sequences.This novel approach evaluates the importance of each semantic segment to improve classification accuracy.The results revealed that the header segment of PE files provides the most valuable information for malware identification,outperforming the other sections,and achieving an average classification accuracy of 99.54%.The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy.
文摘Compliance,as a very important aspect of corporate governance,has developed earlier in the world,while China's compliance management has developed relatively late and is currently lacking in development.However,many enterprises suffer serious losses without compliance management,especially import and export enterprises,which are forced to exit the market due to poor compliance management.This article is based on the urgent need of Chinese enterprises for compliance management,but the lack of research by scholars.It summarizes the literature on the factors affecting compliance,hoping to be helpful for the study of compliance management.