84 research outputs found

    Chemical Utilization of CO2 for grid-scale energy storage: a prospective scenario of China and global energy connection

    Get PDF
    Utilizing carbon dioxide (CO2) sequestered from large point sources to produce fuels and chemicals has been proposed as an energy carrier of storing intermittent renewable energy. The integrated technology is Power to Gas (PtG), or Power to Liquid (PtL) process. In the scenario of very-high installed renewable energy source (RES\u3e80%) or curtailed wind/solar energy, the RES+PtG/ PtL will play an important role of energy transition while fossil fuels are phased out. The study reviews and assesses the technology development, economic feasibility, system impact and future outlook in prospective of grid-scale analysis and global energy interconnection

    CAEV Vif Hijacks ElonginB/C, CYPA and Cullin5 to Assemble the E3 Ubiquitin Ligase Complex Stepwise to Degrade oaA3Z2-Z3

    Get PDF
    Caprine arthritis encephalitis virus (CAEV) is a lentivirus that causes multisystemic chronic disorders in sheep and goats. It encodes Vif to counteract the restriction of Ovis aries A3Z2-Z3 (oaA3Z2-Z3) by inducing their degradation. Nevertheless, the mechanisms underlying the interplay between CAEV Vif and OaA3Z2-Z3 have yet to be elucidated. Here, we identified the cellular factors ElonginB/C, CYPA and Cullin5 as being hijacked by CAEV Vif as well as several functional domains of CAEV Vif required for degrading oaA3Z2-Z3. Moreover, we determined that CAEV Vif assembled E3 ubiquitin ligase stepwise via its SLE motif (170SLE172) to recruit ElonginB/C, the P21 site and the zinc finger motif (C132-C134-C154-C157) to recruit CYPA, as well as the hydrophobic domain (141IR142) to recruit Cullin5. And this CAEV Vif-mediated E3 ligase triggers the proteasomal degradation of oaA3Z2-Z3, which directly bind CAEV Vif through residues Y39 and L44. In particular, CYPA played an essential role in the process to regulate ligase assembly, which was analogous to CBF-β, the essential regulator for HIV-1 and SIV-mediated E3 ligase, indicating that there is a modular conservation and lineage-specific preference for cellular partners required by Vifs from different subgroups of lentiviruses. Taken together, these findings provide important insights regarding the CAEV Vif function and deepen our understanding of the arms race between the lentiviruses and their hosts

    Analysis of infection related factors and clinical characteristics after percutaneous vertebral augmentation procedures

    Get PDF
    Objective Based on the clinical study of patients infected after percutaneous vertebral augmentation procedures (PVAP), the infection related factors and clinical characteristics were analyzed to provide basis for early prevention and diagnosis. Methods A retrospective study was conducted to analyze the diagnosis and treatment process and prognosis of 5 patients with infection after PVAP in Shanghai Ninth Peaple's Hospital from December 2017 to November 2023. Results There were 3 males and 2 females, aged 68-81 years, with an average age of 74.8 years. The time from operation to infection was 5-24 months. All patients presented with low back pain, the visual analogue scale (VAS) score was 7-8. All patients had imited thoracolumbar movement, local tenderness and percussion pain. Four patients had nerve symptoms such as decreased muscle strength in both lower limbs to varying degrees, 2 of which accompanied by defecation disorder. In laboratory tests, white blood cell (WBC) count was (4.0-7.3)×109/L, C-reactive protein (CRP) was 1.51-66.00 mg/dL, erythrocyte sedimentation rate (ESR) was 2-94 mm/1 h, and procalcitonin (PCT) was 0.10-0.40 ng/mL. X-ray, CT and MRI indicated the manifestations of infection, etiology and pathology confirmed 4 cases of Mycobacterium tuberculosis, of which 1 case was complicated with Acinetobacter baumannii, and the other case was diagnosed with Staphylococcus epidermidis. At the last follow-up, 2 patients died of complications, 3 patients were relieved of low back pain after surgery combined with drug treatment, body temperature was normal and inflammatory indicators were within the normal reference value range, and imaging examination showed no signs of infection. Conclusion Adequate preoperative assessment, symptomatic treatment of complications, and standard operation during the operation can reduce the incidence of infection after PVAP. If infection occurs, early diagnosis and systematic treatment can obtain good results

    A Pathway-Based Kernel Boosting Method for Sample Classification Using Genomic Data

    No full text
    The analysis of cancer genomic data has long suffered “the curse of dimensionality.” Sample sizes for most cancer genomic studies are a few hundreds at most while there are tens of thousands of genomic features studied. Various methods have been proposed to leverage prior biological knowledge, such as pathways, to more effectively analyze cancer genomic data. Most of the methods focus on testing marginal significance of the associations between pathways and clinical phenotypes. They can identify informative pathways but do not involve predictive modeling. In this article, we propose a Pathway-based Kernel Boosting (PKB) method for integrating gene pathway information for sample classification, where we use kernel functions calculated from each pathway as base learners and learn the weights through iterative optimization of the classification loss function. We apply PKB and several competing methods to three cancer studies with pathological and clinical information, including tumor grade, stage, tumor sites and metastasis status. Our results show that PKB outperforms other methods and identifies pathways relevant to the outcome variables

    Variational Quantum Algorithm Applied to Collision Avoidance of Unmanned Aerial Vehicles

    No full text
    Mission planning for multiple unmanned aerial vehicles (UAVs) is a complex problem that is expected to be solved by quantum computing. With the increasing application of UAVs, the demand for efficient conflict management strategies to ensure airspace safety continues to increase. In the era of noisy intermediate-scale quantum (NISQ) devices, variational quantum algorithms (VQA) for optimizing parameterized quantum circuits with the help of classical optimizers are currently one of the most promising strategies to gain quantum advantage. In this paper, we propose a mathematical model for the UAV collision avoidance problem that maps the collision avoidance problem to a quadratic unconstrained binary optimization (QUBO) problem. The problem is formulated as an Ising Hamiltonian, then the ground state is solved using two kinds of VQAs: the variational quantum eigensolver (VQE) and the quantum approximate optimization algorithm (QAOA). We select conditional value-at-risk (CVaR) to further promote the performance of our model. Four examples are given to validate that with our method the probability of obtaining a feasible solution can exceed 90% based on appropriate parameters, and our method can enhance the efficiency of a UAVs’ collision avoidance model

    Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition Technology

    No full text
    The technology of fingerprint recognition has been extensively utilized for identity authentication due to the inherent privacy concerns associated with fingerprint images. However, directly publishing fingerprint images on the Internet can result in the leakage of sensitive information. In order to protect the sensitive information in fingerprint images, this paper proposes a novel method called LSDP that combines wavelet transform and singular value decomposition while ensuring differential privacy protection. The primary focus of protecting fingerprint images involves safeguarding the matrix of two-dimensional images. To mitigate excessive noise generated by differential privacy when adding noise to the matrix of fingerprint images, this study employs wavelet transform as a solution. Additionally, it utilizes the exponential mechanism in conjunction with wavelet transform to select an appropriate threshold in order to reduce noise added by differential privacy. This approach is referred to as DWP. Furthermore, singular value decomposition is applied to the coefficients obtained from wavelet transforms. In order to reduce the effect of noise errors, perturbation noise is only added to the singular values instead of all coefficients. This proposed method is termed SDP. To enhance privacy protection during publication of fingerprint images, LSDP adds perturbation noise only to some of the singular values. Experimental results demonstrate that our proposed algorithm outperforms direct application of wavelet transform or singular value decomposition in terms of safeguarding fingerprint image
    corecore