1,163 research outputs found

    RFWD3 acts as a tumor promotor in the development and progression of bladder cancer

    Get PDF
    Background. Bladder cancer is one of the most commonly diagnosed malignancies of the urinary system with relatively poor prognosis and insufficient treatment strategies. RFWD3 is an E3 ligase whose function is rarely investigated in malignant tumors. Methods. A tissue microarray was used for evaluating RFWD3 expression in clinical samples and its correlation with tumor characteristics and patients’ prognosis. RFWD3 knockdown and overexpression cell models were constructed for conducting loss-of-function and gain-of-function assays. qPCR and western blotting were used for detecting mRNA and protein levels of RFWD3, respectively. MTT assay, colony formation assay, flow cytometry, wound-healing assay and transwell assay were carried out to demonstrate the change of cell phenotypes upon RFWD3 knockdown. Results. RFWD3 expression was relatively higher in bladder cancer tissues than in normal tissues, which is correlated with higher N stage and poorer prognosis of patients. Knockdown of RFWD3 in bladder cancer cells significantly inhibited cell proliferation, colony formation, promote cell apoptosis and restrained cell migration. Overexpression of RFWD3 induced the opposite effects. Conclusions. It was illustrated that RFWD3 possesses excellent tumor-promoting ability in bladder cancer. Accordingly, RFWD3 may be a promising therapeutic target in the targeted therapy of bladder cancer, which is worth further research

    Service requirement for terminal delivery: an empirical study from the perspective of online shoppers

    Get PDF
    To investigate customer’s service requirement for parcel delivery, combining with theoretical analysis and empirical test, a measuring model of customer service requirement was proposed for terminal delivery. Based on literature reviews, five potential dimensions with 27 items were initially discussed. Through exploratory factor analysis on samples collected from Taobao networks, four dimensions with 18 measurement items were finally confirmed including service attitude, service reliability, service standardization and service flexibility. By further confirmatory factor analysis, the fitness of this measuring model was proved to be acceptable. The research revealed that online shoppers paid attention to not only service result but also service process, so related suggestions were also proposed for express firms to promote their service management.Peer Reviewe

    Region-controlled Style Transfer

    Full text link
    Image style transfer is a challenging task in computational vision. Existing algorithms transfer the color and texture of style images by controlling the neural network's feature layers. However, they fail to control the strength of textures in different regions of the content image. To address this issue, we propose a training method that uses a loss function to constrain the style intensity in different regions. This method guides the transfer strength of style features in different regions based on the gradient relationship between style and content images. Additionally, we introduce a novel feature fusion method that linearly transforms content features to resemble style features while preserving their semantic relationships. Extensive experiments have demonstrated the effectiveness of our proposed approach

    Greedy-Mine: A Profitable Mining Attack Strategy in Bitcoin-NG

    Full text link
    Bitcoin-NG is an extensible blockchain protocol based on the same trust model as Bitcoin. It divides each epoch into one Key-Block and multiple Micro-Blocks, effectively improving transaction processing capacity. Bitcoin-NG adopts a special incentive mechanism (i.e., the transaction fees in each epoch are split to the current and next leader) to maintain its security. However, there are some limitations to the existing incentive analysis of Bitcoin-NG in recent works. First, the incentive division method of Bitcoin-NG only includes some specific mining attack strategies of adversary, while ignoring more stubborn attack strategies. Second, once adversaries find a whale transaction, they will deviate from honest mining strategy to obtain extra reward. In this paper, we are committed to solving these two limitations. First, we propose a novel mining strategy named Greedy-Mine attack. Then, we formulate a Markov Decision Process (MDP) model to analyze the competition of honest miners and adversaries. Furthermore, we analysis the extra reward of adversaries and summarize the mining power proportion range required for malicious adversaries to launch Greedy-Mine to obtain extra returns. Finally, we make a backward-compatibility progressive modification to Bitcoin-NG protocol that would raise the threshold of propagation factor from 0 to 1. Meanwhile, we get the winning condition of adversaries when adopting Greedy-Mine, compared with honest mining. Simulation and experimental results indicate that Bitcoin-NG is not incentive compatible, which is vulnerable to Greedy-Mine attack.Comment: 20 pages, 12 figur

    Optimization of cyclosporin A production by Beauveria nivea in continuous fed-batch fermentation

    Get PDF
    To develop the effective control method for fed-batch culture of cyclosporin A production, we chose fructose, L-valine and (NH4)2HPO4 as feeding nutrients and compared their productivities in relation to different concentrations. The feeding rate of three kinds of feeding materials was controlled to maintain the suitable residual concentration. The fed-batch fermentation results indicated that the optimal concentrations of fructose, L-valine and (NH4)2HPO4 were about 20 g/L, 0.5 g/L and 0.6 g/L for cyclosporin A production, respectively. The cultivation of Beauveria nivea could produce cyclosporin A up to 6.2 g/L for 240 hrs through a continuous feeding-rate-controlled-batch process under the optimal feeding conditions

    Predicting tipping points in mutualistic networks through dimension reduction

    Get PDF
    This article contains supporting information online at www.pnas.org/lookup/suppl/doi:10.1073/pnas.1714958115/-/DCSupplemental.Peer reviewedPublisher PD
    corecore