48 research outputs found
Unprecedented halide‐ion binding and catalytic activity of nanoscale anionic metal oxide clusters
One halide ion (X−) can bind on the surface of nanoscale Anderson‐type polyoxometalate (POMs) clusters [(n‐C4H9)4N]3{AlMo6O18(OH)3[(OCH2)3CCH3]}, and form stable complexes in solution with binding constant K=1.53×103. Single‐crystal structural analysis showed that this binding behavior occurs through multiple hydrogen bonding between X− and three hydroxy groups on the uncapped side of the cluster. This supramolecular interaction in the cluster systems means that their catalytic activities, evaluated from the oxidation of alcohols to aldehydes, can be switched upon the introduction of halide ions and water molecules. The halide ions work as inhibitors by blocking the active sites of the clusters while they can be re‐activated by the addition of water
Anomalous size effects of effective stiffnesses in bistable counter-rotating mechanical metamaterials
Counter-rotating mechanical metamaterials have previously been found to have
anomalous characteristics or functions such as auxetics effects, shape
changers, and soliton transports, which are all under monostable conditions.
The properties of counter-rotating mechanical metamaterials under bistable
conditions have not yet been explored. Here, we found that for a bistable
counter-rotating metamaterial chain, the effective stiffnesses of the two
steady states are different in the chain with even-numbered nodes. For the
chain with odd-numbered nodes, the effective stiffnesses corresponding to the
two steady states are exactly the same. This special property is not
characterized by the characteristic attenuation lengths of the underlying
mechanism, but depends on the different symmetries of the underlying mechanism
of the chains with odd and even nodes. In addition, the relationship between
the abnormal non-monotonic size effect and equilibrium angle are clarified.
More interestingly, for one-dimensional chains with even-numbered nodes, the
size effect of effective stiffness bifurcates at a specific equilibrium angle,
and the according mechanisms are revealed
Circular RNA Expression Profiling Identifies Prostate Cancer- Specific circRNAs in Prostate Cancer
Background/Aims: Prostate cancer (PCa) is one of the main cancers that damage males’ health severely with high morbidity and mortality, but there is still no ideal molecular marker for the diagnosis and prognosis of prostate cancer. Methods: To determine whether the differentially expressed circRNAs in prostate cancer can serve as novel biomarkers for prostate cancer diagnosis, we screened differentially expressed circRNAs using SBC-ceRNA array in 4 pairs of prostate tumor and paracancerous tissues. A circRNA-miRNA-mRNA regulatory network for the differential circRNAs and their host genes was constructed by Cytoscape3.5.1 software. Quantitative real-time polymerase chain reaction analysis (qRT-PCR) was performed to confirm the microarray data. Results: We found 1021 differentially expressed circRNAs in PCa tumor using SBC-ceRNA array and confirmed the expression of circ_0057558, circ_0062019 and SLC19A1 in PCa cell lines and tumor tissues through qRT-PCR analysis. We demonstrated that combination of PSA level and two differentially expressed circRNAs showed significantly increased AUC, sensitivity and specificity (0.938, 84.5% and 90.9%, respectively) than PSA alone (AUC of serum PSA was 0.854). Moreover, circ_0057558 was correlated positively with total cholesterol. The functional network of circRNA-miRNA-mRNA analysis showed that circ_0057558 and circ_0034467 regulated miR-6884, and circ_0062019 and circ_0060325 regulated miR-5008. Conclusion: Our results demonstrated that differentially expressed circRNAs (circ_0062019 and circ_0057558) and host gene SLC19A1 of circ_0062019 could be used as potential novel biomarkers for prostate cancer
Deep Active Learning for Computer Vision Tasks: Methodologies, Applications, and Challenges
Active learning is a label-efficient machine learning method that actively selects the most valuable unlabeled samples to annotate. Active learning focuses on achieving the best possible performance while using as few, high-quality sample annotations as possible. Recently, active learning achieved promotion combined with deep learning-based methods, which are named deep active learning methods in this paper. Deep active learning plays a crucial role in computer vision tasks, especially in label-insensitive scenarios, such as hard-to-label tasks (medical images analysis) and time-consuming tasks (autonomous driving). However, deep active learning still has some challenges, such as unstable performance and dirty data, which are future research trends. Compared with other reviews on deep active learning, our work introduced the deep active learning from computer vision-related methodologies and corresponding applications. The expected audience of this vision-friendly survey are researchers who are working in computer vision but willing to utilize deep active learning methods to solve vision problems. Specifically, this review systematically focuses on the details of methods, applications, and challenges in vision tasks, and we also introduce the classic theories, strategies, and scenarios of active learning in brief
Formal Analysis of DTLS-SRTP Combined Protocol Based on Logic of Events
Security analysis of composite protocols is a critical issue in the field of network security. In complex network environments, the traditional approach of analyzing a single protocol becomes inadequate when dealing with scenarios involving multiple interactions and combinations of protocols. To address this challenge, this paper extends the Logic of Events Theory (LoET) and proposes a method for proving the security of composite protocols. Building upon the Logic of Events Theory, we introduce sequential composition rules, ordering rules, and relevant axioms. We incorporate the concept of invariants and formally abstract the DTLS-SRTP protocol, thereby verifying the mutual authentication and confidentiality of the two sub-protocols. In conclusion, our study demonstrates that the extended Logic of Events Theory offers an effective means of verifying the security of composite protocols