214 research outputs found

    A review of university-enterprise-cooperation research in China: a quantitative perspective

    Get PDF
    The University-Enterprise-Cooperation (UEC) has been adopted by many universities globally to effectively utilize the high-quality resources of the construction industry, to improve the general competence, problem-solving skills and innovation capability of graduates of an engineering discipline. There are a limited amount of papers published in international journals on UEC, compared to a significant volume of Chinese published literature. However, based on the best knowledge of the authors, no existing literature has conducted a quantitative statistical analysis on UEC research in Chinese and international journals. In order to fill this knowledge gap, 300 high-quality papers on UEC were derived through the Chinese CNKI database from 2010-2019. The general development trend of UEC research in the past 30 years was also mapped and analyzed. The most popular topics under the UEC theme and the most frequently adopted research methods within the UEC field were also identified. It was found that since the first UEC publication in 1990, the number of UEC publications experienced a steady increase during the last decade, aiding by strong promotion from the government and active practice within universities and from educators in China. Course development (52.94%) and practice resource development (24.89%) were two of the most popular research topics in the UEC field. The elaboration research method was adopted by more than half (55.94%) of UEC papers, followed by case study (21.25%). The findings of this study are valuable for researchers and practitioners globally, to better understand the development status of UEC research in China and embark on future research in this field

    Infinitely many solutions for a quasilinear Schrödinger equation with Hardy potentials

    Get PDF
    In this article, we study the following quasilinear Schr\"odinger equation \begin{equation*} -\Delta u-\mu\frac{u}{|x|^{2}}+V(x)u-(\Delta(u^{2}))u=f(x,u),\qquad x\in \mathbb{R}^{N}, \end{equation*} where V(x) V(x) is a given positive potential and the nonlinearity f(x,u)f(x,u) is allowed to be sign-changing. Under some suitable assumptions, we obtain the existence of infinitely many nontrivial solutions by a change of variable and Symmetric Mountain Pass Theorem

    Infinitely many solutions for a quasilinear Schrödinger equation with Hardy potentials

    Get PDF
    In this article, we study the following quasilinear Schrödinger equation −∆u − µ u |x| 2 + V(x)u − (∆(u 2 ))u = f(x, u), x ∈ R N, where V(x) is a given positive potential and the nonlinearity f(x, u) is allowed to be sign-changing. Under some suitable assumptions, we obtain the existence of infinitely many nontrivial solutions by a change of variable and Symmetric Mountain Pass Theorem

    Small Stretch Problem of the DCT Scheme and How to Fix It

    Get PDF
    DCT is a beyond-birthday-bound (BBB) deterministic authenticated encryption (DAE) mode proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation of DCT employs the BRW polynomial, which is more efficient than the usual polynomial in GCM by reducing half of the multiplication operations. However, we show that DCT suffers from a small stretch problem similar to GCM. When the stretch length Ï„ is small, choosing a special m-block message, we can reduce the number of queries required by a successful forgery to O(2Ï„/m). We emphasize that this attack efficiently balances space and time complexity but does not contradict the security bounds of DCT. Finally, we propose an improved scheme named Robust DCT (RDCT) with a minor change to DCT, which improves the security when Ï„ is small and makes it resist the above attack

    Small Stretch Problem of the DCT Scheme and How to Fix it

    Get PDF
    DCT is a beyond-birthday-bound~(BBB) deterministic authenticated encryption~(DAE) mode proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation scheme of DCT employs the BRW polynomial, which is more efficient than the usual polynomial function in GCM by reducing half of the multiplication operations. However, we show that DCT suffers from a small stretch problem similar to GCM. When the stretch length Ï„\tau is small, choosing a special mm-block message, we can reduce the number of queries required by a successful forgery to O(2Ï„/m)\mathcal{O}(2^{\tau}/m). We emphasize that this attack efficiently balances space and time complexity, but does not contradict the security bounds of DCT. Finally, we propose an improved scheme named Robust DCT~(RDCT) with a minor change to DCT, which improves the security when Ï„\tau is small and makes it resist the above attack

    Identification of DNA-binding protein based multiple kernel model

    Get PDF
    DNA-binding proteins (DBPs) play a critical role in the development of drugs for treating genetic diseases and in DNA biology research. It is essential for predicting DNA-binding proteins more accurately and efficiently. In this paper, a Laplacian Local Kernel Alignment-based Restricted Kernel Machine (LapLKA-RKM) is proposed to predict DBPs. In detail, we first extract features from the protein sequence using six methods. Second, the Radial Basis Function (RBF) kernel function is utilized to construct pre-defined kernel metrics. Then, these metrics are combined linearly by weights calculated by LapLKA. Finally, the fused kernel is input to RKM for training and prediction. Independent tests and leave-one-out cross-validation were used to validate the performance of our method on a small dataset and two large datasets. Importantly, we built an online platform to represent our model, which is now freely accessible via http://8.130.69.121:8082/

    Expression of the Inhibitory Receptor TIGIT Is Up-Regulated Specifically on NK Cells With CD226 Activating Receptor From HIV-Infected Individuals

    Get PDF
    Natural killer (NK) cells are important for maintenance of innate immune system stability and serve as a first line of defense against tumors and virus infections; they can act either directly or indirectly and are regulated via co-operation between inhibitory and stimulatory surface receptors. The recently reported inhibitory receptor, TIGIT, can be expressed on the NK cell surface; however, the expression level and function of TIGIT on NK cells during HIV infection is unknown. In this study, for the first time, we investigated the expression and function of TIGIT in NK cells from HIV-infected individuals. Our data demonstrate that the level of TIGIT is higher on NK cells from patients infected with human immunodeficiency virus (HIV) compared with HIV-negative healthy controls. TIGIT expression is inversely correlated with CD4+ T cell counts and positively correlated with plasma viral loads. Additionally, levels of the TIGIT ligand, CD155, were higher on CD4+ T cells from HIV-infected individuals compared with those from healthy controls; however, there was no difference in the level of the activating receptor, CD226, which recognizes the same ligands as TIGIT. Furthermore, TIGIT was found to specifically up-regulated on CD226+ NK cells in HIV-infected individuals, and either rIL-10, or rIL-12 + rIL-15, could induce TIGIT expression on these cells. In addition, high TIGIT expression inhibited the production of interferon-gamma (IFN-γ) by NK cells, while TIGIT inhibition restored IFN-γ production. Overall, these results highlight the important role of TIGIT in NK cell function and suggest a potential new avenue for the development of therapeutic strategies toward a functional cure for HIV
    • …
    corecore