351 research outputs found
Bipolar Electroactive Conducting Polymers for Wireless Cell Stimulation
Electrochemical stimulation (ES) promotes wound healing and tissue regeneration in biomedical applications and clinical studies and is central to the emerging field of electroceuticals. Traditional ES such as deep brain stimulation for Parkinson’s disease, utilises metal electrodes that are hard wired to a power supply to deliver the stimulation. Bipolar electrochemistry (BPE) introduces an innovative approach to cell stimulation that is wireless. Developing conducting polymers (CPs)-based stimulation platforms wireless powdered by BPE bipolar will provide an exciting new dimension to medical bionics. In this project, Chapter 2 deals with development of a bipolar electrochemical activity testing system and bipolar electrochemical stimulation (BPES) system. Then, bipolar electroactive and biocompatible CPs grown on FTO substrate are successfully synthesised, modified, and characterised in Chapter 3 and Chapter 4 using the above systems prior to using for wireless cell stimulation. Furthermore, free standing and soft CP templates are developed (Chapter 5). More importantly, all these bipolar electroactive CPs have been applied to wireless cell stimulation using BPE (all research Chapters). Significant increase in both cell number and neurite growth has been demonstated, suggesting that the BPES system is highly efficient for stimulation of animal PC 12 cell and human SH-SY5Y cell. More specific information is presented in each chapter as below.
In Chapter 3, a CP-based bipolar electrochemical stimulation (BPES) system for cell stimulation was present. Polypyrrole (PPy) films with different dopants have demonstrated reversible and recoverable bipolar electrochemical activity under a low driving DC voltage
Time-sensitive Information Flow Control in Timed Event-B
Protecting confidential data in today’s computing\ud
environments is an important problem. Information flow\ud
control can help to avoid information leakage and violations\ud
introduced by executing the software applications. In software\ud
development cycle, it is important to handle security related\ud
issues from the beginning specifications at the level of abstract.\ud
Mu [1] investigated the problem of preserving information flow\ud
security in the Event-B specification models. A typed Event-\ud
B model was presented to enforce information flow security\ud
and to prevent direct flows introduced by the system. However,\ud
in practice, timing behaviours of programs can also introduce\ud
a covert flow. The problem of run-time flow monitoring and\ud
controlling must also be addressed. This paper investigates\ud
information flow control in the Event-B specification language\ud
with timing constructs. We present a timed Event-B system\ud
by introducing timers and relevant time constraints into the\ud
system events. We suggest a time-sensitive flow security condition\ud
for the timed Event-B systems, and present a type system\ud
to close the covert channels of timing flows for the system by\ud
ensuring the security condition. We then investigate how to\ud
refine timed events during the stepwise refinement modelling\ud
to satisfy the security condition
On non-expandable cross-bifix-free codes
A cross-bifix-free code of length over is defined as a
non-empty subset of satisfying that the prefix set of each
codeword is disjoint from the suffix set of every codeword. Cross-bifix-free
codes have found important applications in digital communication systems. One
of the main research problems on cross-bifix-free codes is to construct
cross-bifix-free codes as large as possible in size. Recently, Wang and Wang
introduced a family of cross-bifix-free codes , which is a
generalization of the classical cross-bifix-free codes studied early by
Lvenshtein, Gilbert and Chee {\it et al.}. It is known that
is nearly optimal in size and is non-expandable if
or . In this paper, we first show that is
non-expandable if and only if or , thereby improving the
results in [Chee {\it et al.}, IEEE-TIT, 2013] and [Wang and Wang, IEEE-TIT,
2022]. We then construct a new family of cross-bifix-free codes
to expand such that the resulting larger
code is a non-expandable
cross-bifix-free code whenever is expandable. Finally, we
present an explicit formula for the size of .Comment: This paper has been submitted to IEEE T-IT for possible publicatio
The new detection of blue straggler stars in 50 open clusters using Gaia DR3
The particularly abundant presence of blue straggler stars (BSS) in Galactic
open clusters offers favorable conditions for detailed studies on the
statistical properties and the origin of the blue straggler population. With
the help of Gaia DR3, the number of identified open clusters continuously
increases, and the determination of star cluster members is more reliable. We
performed a more thorough search for BSS in newly found open clusters based on
Gaia data. We implemented a uniform membership determination for over one
thousand newly identified open clusters with larger sky coverage based on the
astrometric and photometric data from Gaia DR3. The membership probabilities of
stars were assigned by the pyUPMASK algorithm. Then we estimated the physical
parameters of these clusters by isochrone fitting on their CMDs and picked out
BSS in the specific region of these CMDs. We identified 138 BSS that had not
been reported before in 50 open clusters. Compared with recent catalogs that
present more than 1500 BSS in 339 open clusters, our new catalog increased the
number of BSS in Galactic open clusters by about 10%, and the number of open
clusters with BSS by nearly 17%. In the future, more accurate abundance
measurements are anticipated to better probe the origin of BSS in open
clusters.Comment: 9 pages, 10 figures, 2 tables. Published in A&
Extended Perron complements of M-matrices
This paper aims to consider the extended Perron complements for the collection of M-matrices. We first exhibit the connection between the extended Perron complements of M-matrices and nonnegative matrices. Moreover, we present some common inequalities involving extended Perron complements, Schur complements, and principal submatrices of irreducible M-matrices by utilizing the properties of M-matrices. We also discuss the monotonicity of the extended Perron complements and minimum eigenvalue. For the collection of M-matrices, we demonstrate that all (extended) Perron complements are M-matrices. Especially, we deduce that M-matrices and their Perron complements share the same minimum eigenvalue. Finally, a simple example is presented to illustrate our findings
Recommended from our members
Longitudinal survey of microbiome associated with particulate matter in a megacity.
BackgroundWhile the physical and chemical properties of airborne particulate matter (PM) have been extensively studied, their associated microbiome remains largely unexplored. Here, we performed a longitudinal metagenomic survey of 106 samples of airborne PM2.5 and PM10 in Beijing over a period of 6 months in 2012 and 2013, including those from several historically severe smog events.ResultsWe observed that the microbiome composition and functional potential were conserved between PM2.5 and PM10, although considerable temporal variations existed. Among the airborne microorganisms, Propionibacterium acnes, Escherichia coli, Acinetobacter lwoffii, Lactobacillus amylovorus, and Lactobacillus reuteri dominated, along with several viral species. We further identified an extensive repertoire of genes involved in antibiotic resistance and detoxification, including transporters, transpeptidases, and thioredoxins. Sample stratification based on Air Quality Index (AQI) demonstrated that many microbial species, including those associated with human, dog, and mouse feces, exhibit AQI-dependent incidence dynamics. The phylogenetic and functional diversity of air microbiome is comparable to those of soil and water environments, as its composition likely derives from a wide variety of sources.ConclusionsAirborne particulate matter accommodates rich and dynamic microbial communities, including a range of microbial elements that are associated with potential health consequences
Anisodamine combined with lidocaine improves healing of myocardial ischemia reperfusion injury in rats via PI3K/Akt signaling pathway
Purpose: To study the effects of anisodamine (Ad) combined with lidocaine (Ldc) on myocardial ischemia-reperfusion injury (MIRI) in rats, and its correlation with PI3K/AKT signaling pathway.Methods: A total of 70 healthy rats were randomly divided into S group, M group, Ad group, Ldc group, Ad + Ldc group, Ad + Ldc + LY group, and LY group. The cardiac hemodynamic indices in each group were determined, and the area of myocardial infarction measured. Serum biochemical indices were also determined. Furthermore, the protein expressions of p-Akt, T-Akt, Bcl-2, and Bax in myocardial cells were determined by Western blotting.Results: Compared with those in M group, Ad group, Ldc group, Ad + Ldc + LY group, and LY group, cardiac hemodynamic indices significantly improved, while the area of myocardial infarction was significantly reduced (p < 0.01). Furthermore, serum malondialdehyde (MDA) concentration but the activities of CK, CK-MB, TNF-α, and IL-6 declined, while the activities of superoxide dismutase (SOD), CAT and GSH-Px rose in Ad + Ldc group (p < 0.01). In Ad + Ldc group, p-Akt, T-Akt, and Bcl-2 increased, while Bax significantly decreased. Through comparison LY294002 significantly inhibited the protective effect of Ad combined with Ldc against MIRI in rats (p < 0.01).Conclusion: Anisodamine combination with lidocaine has a protective effect against MIRI in rats via PI3K/Akt signaling pathway, thus indicating that it is a potential therapeutic strategy for the management of myocardial ischemia-reperfusion
Electrophysiological correlates of emotional source memory in high-trait-anxiety individuals
The interaction between recognition memory and emotion has become a research hotspot in recent years. Dual process theory posits that familiarity and recollection are two separate processes contributing to recognition memory, but further experimental evidence is needed. The present study explored the emotional context effects on successful and unsuccessful source retrieval amongst 15 high-trait-anxiety college students by using event-related potentials (ERPs) measurement. During study, a happy, fearful, or neutral face picture first was displayed, then a Chinese word was superimposed centrally on the picture and subjects were asked to remember the word and the corresponding type of picture. During the test participants were instructed to press one of four buttons to indicate whether the displayed word was an old or new word. And then, for the old word, indicate whether it had been shown with a fearful, happy, or neutral face during the study. ERPs were generally more positive for remembered words than for new words and the ERP difference was termed as an old/new effect. It was found that, for successful source retrieval (it meant both the item and the source were remembered accurately) between 500 and 700 ms (corresponding to a late positive component, LPC), there were significant old/new effects in all contexts. However, for unsuccessful source retrieval (it meant the correct recognition of old items matched with incorrect source attribution), there were no significant old/new effects in happy and neutral contexts, though significant old/new effects were observed in the fearful context. Between 700 and 1200 ms (corresponding to a late slow wave, LSW), there were significant old/new effects for successful source retrieval in happy and neutral contexts. However, in the fearful context, the old/new effects were reversed, ERPs were more negative for successful source retrieval compared to correct rejections. Moreover, there were significant emotion effects for successful source retrieval at this time window. Further analysis showed ERPs of old items were more negative in fearful context than in neutral context. The results showed that early unsuccessful fearful source retrieval processes (related to familiarity) were enhanced, but late successful fearful source retrieval processes during source retrieval monitoring (related to recollection) were weakened. This provided preliminary evidence for the dual processing theory
- …