48 research outputs found

    Unprecedented halide‐ion binding and catalytic activity of nanoscale anionic metal oxide clusters

    Get PDF
    One halide ion (X−) can bind on the surface of nanoscale Anderson‐type polyoxometalate (POMs) clusters [(n‐C4H9)4N]3{AlMo6O18(OH)3[(OCH2)3CCH3]}, and form stable complexes in solution with binding constant K=1.53×103. Single‐crystal structural analysis showed that this binding behavior occurs through multiple hydrogen bonding between X− and three hydroxy groups on the uncapped side of the cluster. This supramolecular interaction in the cluster systems means that their catalytic activities, evaluated from the oxidation of alcohols to aldehydes, can be switched upon the introduction of halide ions and water molecules. The halide ions work as inhibitors by blocking the active sites of the clusters while they can be re‐activated by the addition of water

    Anomalous size effects of effective stiffnesses in bistable counter-rotating mechanical metamaterials

    Full text link
    Counter-rotating mechanical metamaterials have previously been found to have anomalous characteristics or functions such as auxetics effects, shape changers, and soliton transports, which are all under monostable conditions. The properties of counter-rotating mechanical metamaterials under bistable conditions have not yet been explored. Here, we found that for a bistable counter-rotating metamaterial chain, the effective stiffnesses of the two steady states are different in the chain with even-numbered nodes. For the chain with odd-numbered nodes, the effective stiffnesses corresponding to the two steady states are exactly the same. This special property is not characterized by the characteristic attenuation lengths of the underlying mechanism, but depends on the different symmetries of the underlying mechanism of the chains with odd and even nodes. In addition, the relationship between the abnormal non-monotonic size effect and equilibrium angle are clarified. More interestingly, for one-dimensional chains with even-numbered nodes, the size effect of effective stiffness bifurcates at a specific equilibrium angle, and the according mechanisms are revealed

    Circular RNA Expression Profiling Identifies Prostate Cancer- Specific circRNAs in Prostate Cancer

    Get PDF
    Background/Aims: Prostate cancer (PCa) is one of the main cancers that damage males’ health severely with high morbidity and mortality, but there is still no ideal molecular marker for the diagnosis and prognosis of prostate cancer. Methods: To determine whether the differentially expressed circRNAs in prostate cancer can serve as novel biomarkers for prostate cancer diagnosis, we screened differentially expressed circRNAs using SBC-ceRNA array in 4 pairs of prostate tumor and paracancerous tissues. A circRNA-miRNA-mRNA regulatory network for the differential circRNAs and their host genes was constructed by Cytoscape3.5.1 software. Quantitative real-time polymerase chain reaction analysis (qRT-PCR) was performed to confirm the microarray data. Results: We found 1021 differentially expressed circRNAs in PCa tumor using SBC-ceRNA array and confirmed the expression of circ_0057558, circ_0062019 and SLC19A1 in PCa cell lines and tumor tissues through qRT-PCR analysis. We demonstrated that combination of PSA level and two differentially expressed circRNAs showed significantly increased AUC, sensitivity and specificity (0.938, 84.5% and 90.9%, respectively) than PSA alone (AUC of serum PSA was 0.854). Moreover, circ_0057558 was correlated positively with total cholesterol. The functional network of circRNA-miRNA-mRNA analysis showed that circ_0057558 and circ_0034467 regulated miR-6884, and circ_0062019 and circ_0060325 regulated miR-5008. Conclusion: Our results demonstrated that differentially expressed circRNAs (circ_0062019 and circ_0057558) and host gene SLC19A1 of circ_0062019 could be used as potential novel biomarkers for prostate cancer

    Deep Active Learning for Computer Vision Tasks: Methodologies, Applications, and Challenges

    No full text
    Active learning is a label-efficient machine learning method that actively selects the most valuable unlabeled samples to annotate. Active learning focuses on achieving the best possible performance while using as few, high-quality sample annotations as possible. Recently, active learning achieved promotion combined with deep learning-based methods, which are named deep active learning methods in this paper. Deep active learning plays a crucial role in computer vision tasks, especially in label-insensitive scenarios, such as hard-to-label tasks (medical images analysis) and time-consuming tasks (autonomous driving). However, deep active learning still has some challenges, such as unstable performance and dirty data, which are future research trends. Compared with other reviews on deep active learning, our work introduced the deep active learning from computer vision-related methodologies and corresponding applications. The expected audience of this vision-friendly survey are researchers who are working in computer vision but willing to utilize deep active learning methods to solve vision problems. Specifically, this review systematically focuses on the details of methods, applications, and challenges in vision tasks, and we also introduce the classic theories, strategies, and scenarios of active learning in brief

    Formal Analysis of DTLS-SRTP Combined Protocol Based on Logic of Events

    No full text
    Security analysis of composite protocols is a critical issue in the field of network security. In complex network environments, the traditional approach of analyzing a single protocol becomes inadequate when dealing with scenarios involving multiple interactions and combinations of protocols. To address this challenge, this paper extends the Logic of Events Theory (LoET) and proposes a method for proving the security of composite protocols. Building upon the Logic of Events Theory, we introduce sequential composition rules, ordering rules, and relevant axioms. We incorporate the concept of invariants and formally abstract the DTLS-SRTP protocol, thereby verifying the mutual authentication and confidentiality of the two sub-protocols. In conclusion, our study demonstrates that the extended Logic of Events Theory offers an effective means of verifying the security of composite protocols
    corecore