132 research outputs found

    The biological oxidation inspired biomedical hydrogels

    Get PDF
    Due to its 3D crosslinked networks and adjustable physicochemical properties, hydrogels have been widely applied in tissue engineering, drug-delivery system, pollution regulation, polymer electrolyte, agricultural drought-resistance, cosmetic and food area. However, the harsh prepared conditions and high chemical residues of traditional hydrogel both seriously limited their bio-related applications. We introduced the recent advances on tandem enzyme complex for the radical polymerization and further 3D bio-printing of hydrogel.1,2 We also demonstrated that substrate channel in hydrogel networks can benefit the superactivity of the laden cascade enzymes, which can realize the industrial application of biological oxidation. Finally, we fabricated an enzyme-laden nanogel to mimic neutrophils for antimuor via cascade enzymatic elevation of ROS. This novel biochemical approach is highly useful for cancer therapy. 3,4,5 Please click Additional Files below to see the full abstract

    Researches on Key Algorithms in Analogue Seismogram Records Vectorization

    Get PDF
    Abstract: History paper seismograms are very important information for earthquake monitoring and prediction, and the vectorization of paper seismograms is a very import problem to be resolved. In our study, a new tracing algorithm for simulated seismogram curves based on visual filed feature is presented. We also give out the technological process to vectorizing simulated seismograms, and an analog seismic record vectorization system has been accomplished independently. Using it, we can precisely and speedy vectorize analog seismic records (need professionals to participate interactively)

    A modified surgical technique in the management of eyelid burns: a case series

    Get PDF
    <p>Abstract</p> <p>Introduction</p> <p>Contractures, ectropion and scarring, the most common sequelae of skin grafts after eyelid burn injuries, can result in corneal exposure, corneal ulceration and even blindness. Split-thickness or full-thickness skin grafts are commonly used for the treatment of acute eyelid burns. Plasma exudation and infection are common early complications of eyelid burns, which decrease the success rate of grafts.</p> <p>Case presentation</p> <p>We present the cases of eight patients, two Chinese women and six Chinese men. The first Chinese woman was 36 years old, with 70% body surface area second or third degree flame burn injuries involving her eyelids on both sides. The other Chinese woman was 28 years old, with sulfuric acid burns on her face and third degree burn on her eyelids. The six Chinese men were aged 21, 31, 38, 42, 44, and 55 years, respectively. The 38-year-old patient was transferred from the ER with 80% body surface area second or third degree flame burn injuries and third degree burn injuries to his eyelids. The other five men were all patients with flame burn injuries, with 7% to 10% body surface area third degree burns and eyelids involved. All patients were treated with a modified surgical procedure consisting of separation and loosening of the musculus orbicularis oculi between tarsal plate and septum orbital, followed by grafting a large full-thickness skin graft in three days after burn injury. The use of our modified surgical procedure resulted in 100% successful eyelid grafting on first attempt, and all our patients were in good condition at six-month follow-up.</p> <p>Conclusions</p> <p>This new surgical technique is highly successful in treating eyelid burn injuries, especially flame burn injuries of the eyelid.</p

    The Prevalence of Cryptosporidium spp. and Giardia duodenalis in Marmota himalayana (Rodentia: Sciuridae) in the Qinghai Tibetan Plateau area, China

    Get PDF
    Background: Cryptosporidium and Giardia are well-known important intestinal zoonotic pathogens that can infect various hosts and cause diarrhoeal diseases. We aimed to determine the epidemiological prevalence and molecular characterization of Cryptosporidium and Giardia species in Himalayan marmot (Marmota himalayana, class Marmota) in the Qinghai Tibetan Plateau Area of Qinghai Province, Northwest China. Methods: Overall, 243 Himalayan marmot fecal samples were collected in 2017 and in 2019 and a two-step nested PCR technique was performed to amplify the fragments of the SSU rRNA gene of Cryptosporidium and 18S ribosomal RNA gene of Giardia. Molecular characterization of Cryptosporidium was performed with the primary primers N-DIAGF2 and N-DIAGR2, the secondary primers CPB-DIAGF and CPB-DIAGR. Similarly, molecular characterization of Giardia was used the first primers Gia2029 and Gia2150c, the secondary primers RH11 and RH4. The positive PCR products were sequenced and the sequences were processed by Clustal Omega and BLAST. Phylogenetic analysis was achieved by NJ method in MEGA. Results: The infection rate of Cryptosporidium spp. and G. duodenalis was 4.9% (12/243) and 0.8% (2/243) in M. himalayana, respectively. Cryptosporidium spp. are characterized as novel genotypes Cryptosporidium marmot genotype I (n=3) and Cryptosporidium marmot genotype II (n=9); G. duodenalis assemblage A (n=2) was found in M. himalayana. Conclusion: This is the first report of Cryptosporidium spp. and G. duodenalis infections in M. himalayana in Qinghai of Northwest China. The results indicate the existence of Cryptosporidium species and G. duodenalis infections that may have a potential public health significance

    Coordinated cyber-physical attack on power grids based on malicious power dispatch

    Get PDF
    This paper proposes a new mode of cyber-physical attack based on injecting false commands, which poses an increasing risk to modern power systems as a typical example of Cyber-Physical Systems (CPS). Such attacks can trigger physical attacks by driving the system into vulnerable states. To address the critical issues arising from this new mode, we define an inverse-community (IC) in power flow distribution and evaluate it using inverse-modularity. To identify the most vulnerable state of the IC that represents the inherent vulnerability of the system, we employ a full malicious power dispatch problem. We also analyze an example of the proposed mode, where a partial malicious power dispatch that maximizes inverse-modularity is combined with physical attacks aimed at disconnecting vulnerable IC boundary lines, making cascading failures highly likely. To demonstrate the potential impact of this coordinated cyber-physical attack, we use the IEEE-118 and IEEE-300 bus systems for simulation. The results show the effectiveness of this attack strategy and provide a new perspective to analyze cyber-physical security issues in modern power systems
    corecore