Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Background Circular RNAs (circRNAs) have recently been shown to play important roles in different tumors. However, their detailed roles and regulatory mechanisms in pancreatic ductal adenocarcinoma (PDAC) are not well understood. This... more
Background Circular RNAs (circRNAs) have recently been shown to play important roles in different tumors. However, their detailed roles and regulatory mechanisms in pancreatic ductal adenocarcinoma (PDAC) are not well understood. This study aimed to identify enriched circRNAs and detect their functions and mechanisms in PDAC cells and tissues. Methods circRNA-ASH2L (circ-ASH2L) was identified by circRNA microarray studies based on previous studies, and further detected in PDAC cells and samples by qRT-PCR. The functions of circ-ASH2L were identified by transwell, EdU, cell cycle or Tube formation assays. The regulatory mechanisms of circ-ASH2L were explored by WB, RIP, FISH, dual-luciferase assays, RNA pulldown or other assays. Results We identified a circRNA (circ-ASH2L) based on our previous studies, detected its expression in different malignant cells and found that circ-ASH2L was highly expressed in pancreatic cells or tumor tissues and correlated with tumor malignancy. Further ...
Quenching and partitioning (Q&P) processes were applied to a cold-rolled high strength steel (0.19C-1.26Si-2.82Mn-0.92Ni, wt %). The effects of the prior hot-rolled microstructure on the optimum quenching temperature of the studied steels... more
Quenching and partitioning (Q&P) processes were applied to a cold-rolled high strength steel (0.19C-1.26Si-2.82Mn-0.92Ni, wt %). The effects of the prior hot-rolled microstructure on the optimum quenching temperature of the studied steels were systematically investigated. The microstructure was analyzed by means of transmission electron microscope (TEM), electron backscatter diffraction (EBSD) and X-ray diffraction (XRD). Compared with the ferrite pearlite mixture matrix, the lower martensite start (Ms) temperature and smaller prior austenite grain size in the cold-rolled martensite matrix are the main reasons for the optimum quenching temperature shifting to a lower temperature in the Q&P steels. We found that an empirical formula that only considers the influence of the alloy composition in the calculation of the Ms temperature will cause a certain interference to the pre-determined optimum quenching temperature of the Q&P steel.
Most neoplasms of the parapharyngeal space are benign. The transcervical surgical approach is the preferred procedure in most cases. Intra-operative endoscopic exploration offers a new surgical management technique to reduce operative... more
Most neoplasms of the parapharyngeal space are benign. The transcervical surgical approach is the preferred procedure in most cases. Intra-operative endoscopic exploration offers a new surgical management technique to reduce operative complications and post-operative recurrence rates. To present the authors' experience in the treatment of primary parapharyngeal space tumors with emphasis on surgical approaches and employment of endoscopy to detect residual tumors through conventional approaches. One hundred and sixty-seven patients treated surgically over a 10-year period were retrospectively reviewed. A comparison of the surgical approaches in a relevant case series was also conducted. All of the patients underwent pre-operative imaging before surgery, and intra-operative endoscopic detection was selectively used for large, deep tumors. Complete resection of the tumor was used in 158 patients (95%), with a transcervical surgical approach applied in 144 cases (84%). Of 167 tumor...
... REFERENCES [1] Ramanathan, R.; Redi, J. “A brief overview of ad hoc networks: challenges and directions”, Communications Magazine, IEEE, Vol 40, Issue 5, Part Anniversary, May 2002 Page(s):20 – 22. ... [4] Karthikeyan Sundaresan,... more
... REFERENCES [1] Ramanathan, R.; Redi, J. “A brief overview of ad hoc networks: challenges and directions”, Communications Magazine, IEEE, Vol 40, Issue 5, Part Anniversary, May 2002 Page(s):20 – 22. ... [4] Karthikeyan Sundaresan, Raghupathy Sivakumar, Mary Ann Ingram ...
... It may disrupt the cooperative handshake for a long time as described in Fig.2. Therefore, the ... S is listening and detects the channel idle; 2) S is listening and hears a handshake packet from ... as follows: Case 1: Node S does... more
... It may disrupt the cooperative handshake for a long time as described in Fig.2. Therefore, the ... S is listening and detects the channel idle; 2) S is listening and hears a handshake packet from ... as follows: Case 1: Node S does not transmit and all stations in S's detection range keep ...
As the starting point of the movie, the invisible art of film and television with visible clothing art to be expressed, this is the perfect combination of art. The inseparable relationship between clothing and movies, as an art form,... more
As the starting point of the movie, the invisible art of film and television with visible clothing art to be expressed, this is the perfect combination of art. The inseparable relationship between clothing and movies, as an art form, clothing is a national and regional cultural and aesthetic appeal of the carrier. Dress as important elements of costume elements, which lead the development of garment industry. The purpose of this paper is to dress in reproduction from the montage and the screen even as the story two dress designs innovation of new ideas on dress innovative design.
Face authentication systems are becoming increasingly prevalent, especially with the rapid development of Deep Learning technologies. However, human facial information is easy to be captured and reproduced, which makes face authentication... more
Face authentication systems are becoming increasingly prevalent, especially with the rapid development of Deep Learning technologies. However, human facial information is easy to be captured and reproduced, which makes face authentication systems vulnerable to various attacks. Liveness detection is an important defense technique to prevent such attacks, but existing solutions did not provide clear and strong security guarantees, especially in terms of time. To overcome these limitations, we propose a new liveness detection protocol called Face Flashing that significantly increases the bar for launching successful attacks on face authentication systems. By randomly flashing well-designed pictures on a screen and analyzing the reflected light, our protocol has leveraged physical characteristics of human faces: reflection processing at the speed of light, unique textual features, and uneven 3D shapes. Cooperating with working mechanism of the screen and digital cameras, our protocol is able to detect subtle traces left by an attacking process. To demonstrate the effectiveness of Face Flashing, we implemented a prototype and performed thorough evaluations with large data set collected from real-world scenarios. The results show that our Timing Verification can effectively detect the time gap between legitimate authentications and malicious cases. Our Face Verification can also differentiate 2D plane from 3D objects accurately. The overall accuracy of our liveness detection system is 98.8%, and its robustness was evaluated in different scenarios. In the worst case, our system's accuracy decreased to a still-high 97.3%.