Gut Microbiota-brain Axis Wang, Hong-Xing; Wang, Yu-Ping
Chinese medical journal,
10/2016, Letnik:
129, Številka:
19
Journal Article
Recenzirano
Odprti dostop
Objective: To systematically review the updated information about the gut microbiota-brain axis.
Data Sources: All articles about gut microbiota-brain axis published up to July 18, 2016, were ...identified through a literature search on PubMed, ScienceDirect, and Web of Science, with the keywords of "gut microbiota", "gut-brain axis", and "neuroscience".
Study Selection: All relevant articles on gut microbiota and gut-brain axis were included and carefully reviewed, with no limitation of study design.
Results: It is well-recognized that gut microbiota affects the brain's physiological, behavioral, and cognitive functions although its precise mechanism has not yet been fully understood. Gut microbiota-brain axis may include gut microbiota and their metabolic products, enteric nervous system, sympathetic and parasympathetic branches within the autonomic nervous system, neural-immune system, neuroendocrine system, and central nervous system. Moreover, there may be five communication routes between gut microbiota and brain, including the gut-brain's neural network, neuroendocrine-hypothalamic-pituitary-adrenal axis, gut immune system, some neurotransmitters and neural regulators synthesized by gut bacteria, and barrier paths including intestinal mucosal barrier and blood-brain barrier. The microbiome is used to define the composition and functional characteristics of gut microbiota, and metagenomics is an appropriate technique to characterize gut microbiota.
Conclusions: Gut microbiota-brain axis refers to a bidirectional information network between the gut microbiota and the brain, which may provide a new way to protect the brain in the near future.
As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus ...protocols provide the nodes, referred to as miners, in the network with incentives for confirming new block of transactions through a process of “block mining” by solving a cryptographic puzzle. Under the circumstance of limited local computing resources, e.g., mobile devices, it is natural for rational miners, i.e., consensus nodes, to offload computational tasks for proof of work to the cloud/fog computing servers. Therefore, we focus on the trading between the cloud/fog computing service provider and miners, and propose an auction-based market model for efficient computing resource allocation. In particular, we consider a proof-of-work based blockchain network, which is constrained by the computing resource and deployed as an infrastructure for decentralized data management applications. Due to the competition among miners in the blockchain network, the allocative externalities are particularly taken into account when designing the auction mechanisms. Specifically, we consider two bidding schemes: the constant-demand scheme where each miner bids for a fixed quantity of resources, and the multi-demand scheme where the miners can submit their preferable demands and bids. For the constant-demand bidding scheme, we propose an auction mechanism that achieves optimal social welfare. In the multi-demand bidding scheme, the social welfare maximization problem is NP-hard. Therefore, we design an approximate algorithm which guarantees the truthfulness, individual rationality and computational efficiency. Through extensive simulations, we show that our proposed auction mechanisms with the two bidding schemes can efficiently maximize the social welfare of the blockchain network and provide effective strategies for the cloud/fog computing service provider.
Intensification of the Earth's hydrological cycle amplifies the interannual variability of precipitation, which will significantly impact the terrestrial carbon (C) cycle. However, it is still ...unknown whether previously observed relationship between soil respiration (Rs) and precipitation remains applicable under extreme precipitation change. By analyzing the observations from a much larger dataset of field experiments (248 published papers including 151 grassland studies and 97 forest studies) across a wider range of precipitation manipulation than previous studies, we found that the relationship of Rs response with precipitation change was highly nonlinear or asymmetric, and differed significantly between grasslands and forests, between moderate and extreme precipitation changes. Response of Rs to precipitation change was negatively asymmetric (concave‐down) in grasslands, and double‐asymmetric in forests with a positive asymmetry (concave‐up) under moderate precipitation changes and a negative asymmetry (concave‐down) under extreme precipitation changes. In grasslands, the negative asymmetry in Rs response was attributed to the higher sensitivities of soil moisture, microbial and root activities to decreased precipitation (DPPT) than to increased precipitation (IPPT). In forests, the positive asymmetry was predominantly driven by the significant increase in microbial respiration under moderate IPPT, while the negative asymmetry was caused by the reductions in root biomass and respiration under extreme DPPT. The different asymmetric responses of Rs between grasslands and forests will greatly improve our ability to forecast the C cycle consequences of increased precipitation variability. Specifically, the negative asymmetry of Rs response under extreme precipitation change suggests that the soil C efflux will decrease across grasslands and forests under future precipitation regime with more wet and dry extremes.
The relationship of soil respiration response with precipitation change was highly nonlinear or asymmetric, and differed significantly between grasslands and forests. Soil respiration response was negatively asymmetric (concave‐down) in grasslands, and double‐asymmetric in forests with a positive asymmetry (concave‐up) under moderate precipitation changes and a negative asymmetry (concave‐down) under extreme precipitation changes.
Display omitted
•We demonstrate privacy breaches into two password authentication schemes for WSNs.•Public-key techniques are indispensible to achieve user untraceability.•Our principle is applicable ...to two-factor authentication for universal environments.•We discuss the viable solutions to practical realization of user anonymity.•Experimental timings of related public-key operations on small devices are reported.
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have been devoted to designing schemes with user anonymity by only using lightweight symmetric-key primitives such as hash functions and block ciphers, to the best of our knowledge none has succeeded so far. In this work, we take an initial step to shed light on the rationale underlying this prominent issue. Firstly, we scrutinize two previously-thought sound schemes, namely Fan et al.’s scheme and Xue et al.’s scheme, and demonstrate the major challenges in designing a scheme with user anonymity.
Secondly, using these two foremost schemes as case studies and on the basis of the work of Halevi–Krawczyk (1999) 44 and Impagliazzo–Rudich (1989) 43, we put forward a general principle: Public-key techniques are intrinsically indispensable to construct a two-factor authentication scheme that can support user anonymity. Furthermore, we discuss the practical solutions to realize user anonymity. Remarkably, our principle can be applied to two-factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds. We believe that our work contributes to a better understanding of the inherent complexity in achieving user privacy, and will establish a groundwork for developing more secure and efficient privacy-preserving two-factor authentication schemes.
In this work, the evolution of microstructure and fundamental mechanical properties with Mo concentration in the arc-melted (TiZrNbTa)100-xMox (0 ≤ x ≤ 20) high-entropy alloys (HEAs) are ...investigated. The arc-melted (TiZrNbTa)100-xMox alloys structurally consist of two bcc phases. The change in volume fractions of two phases in the microstructure is insignificant with Mo concentration, at levels of ∼75% for bcc1 and ∼25% for bcc2. The increases in microhardness and Young's modulus of the alloys linearly scale with Mo concentration. To compromise the strength and ductility, the (TiZrNbTa)90Mo10 exhibits an optimal combination of stiffness (E = 137 GPa), compressive yield strength (σy = 1370 MPa) and deformability (εp ≈ 25%). In addition, it is indicated that dislocation widths in bcc lattice of refractory HEAs are insensitive to the alloying complexity, reflecting that the Peierls barrier is excluded as a predominant factor of strengthening. Furthermore, a simple model is proposed to reveal the solid solution hardening (SSH) in bcc refractory HEAs, in which the solid solutions are treated as an imposition of distortion-free and distorted lattices. By applying this model to archived refractory HEAs, the predicted yield strength agrees well with experimentally measured values. It provides a simple empirical tool used for predicting the strength of bcc refractory HEAs and to assist new alloy design.
•Arc-melted (TiZrNbTa)Mo high-entropy alloys (HEAs) consist of two bcc phases in microstructure.•Microhardness and Young's modulus of the alloys increases with Mo concentration.•(TiZrNbTa)90Mo10 exhibits an optimal combination of compressive strength and deformability.•A simple model is proposed to reveal the solid solution hardening in bcc refractory HEAs.•Yield strength predicted with this model is good in agreement with experimental data.
Dozens of two-factor authentication schemes have been proposed to secure real-time data access in industrial wireless sensor networks (WSNs). However, more often than not, the protocol designers ...advocate the merits of their scheme, but do not reveal (or unconsciously ignoring) the facets on which their scheme performs poorly. Such lack of an objective, comprehensive measurement leads to the unsatisfactory "break-fix-break-fix" cycle in this research area. In this paper, we make an attempt toward breaking this undesirable cycle by proposing a systematical evaluation framework for schemes to be assessed objectively, revisiting two foremost schemes proposed by Wu et al. (2017) and Srinivas et al. (2017) to reveal the challenges and difficulties in designing a sound scheme, and conducting a measurement of 44 representative schemes under our evaluation framework, thereby providing the missing evaluation for two-factor schemes in industrial WSNs. This work would help increase awareness of current measurement issues and improve the scientific process in our field.
Abandoned tailings are one of the most important sources of heavy metal pollution in the areas surrounding mining districts, and significant leaching of heavy metals could be brought by ...precipitation. This study investigated the leaching of heavy metals from the tailings of a small-scale abandoned polymetallic mine in south China by rainwater with batch and column tests and evaluated the associated environmental impact. The mean contents of Cr, Ni, Cu, Zn, As, Cd, and Pb in the un-weathered mine tailings were 1.46×102, 3.11×102, 4.10×103, 2.18×104, 2.82×102, 5.65×102, and 8.74×103mg/kg, respectively, and appreciable fractions of Cd, Zn, Cu, and Cr in the tailings were present in the acid soluble form. Batch and column leaching tests consistently showed that significant quantities of heavy metals could be released from the mine tailings. Based on the results of column leaching tests, it was estimated that the average fluxes of Cr, Ni, Cu, Zn, As, Cd, and Pb from the mine tailings at the studied mining district leached by precipitation were 3.20, 38.3, 12.5, 1.52×104, 104, 1.08, and 9.26g/ha/yr, respectively. The metal-rich tailing leachate would impact the quality of surface water and soils downhill of the mining district, and pose significant potential ecological risk to the farmland soils, which are irrigated by local surface water. These findings indicate the importance of tailings as a source of heavy metals in the mining districts of south China with heavy precipitation, as well as the need for mitigating the releases of heavy metals and the associated environmental impact from abandoned mine tailings.
Display omitted
•Mine tailings are an important source of heavy metals to the surrounding environment•Leaching of heavy metals from mine tailings was studied with batch and column tests•>5% of Cd and Zn, >1% of Cu and Cr in the tailings were present in acid soluble form•Rainwater could leach significant quantities of heavy metals from the mine tailings•Leachate from mine tailings could cause accumulation of heavy metals in local soils
N6-methyladenosine (m6A) is a prevalent, reversible chemical modification of functional RNAs and is important for central events in biology. The core m6A writers are Mettl3 and Mettl14, which both ...contain methyltransferase domains. How Mettl3 and Mettl14 cooperate to catalyze methylation of adenosines has remained elusive. We present crystal structures of the complex of Mettl3/Mettl14 methyltransferase domains in apo form as well as with bound S-adenosylmethionine (SAM) or S-adenosylhomocysteine (SAH) in the catalytic site. We determine that the heterodimeric complex of methyltransferase domains, combined with CCCH motifs, constitutes the minimally required regions for creating m6A modifications in vitro. We also show that Mettl3 is the catalytically active subunit, while Mettl14 plays a structural role critical for substrate recognition. Our model provides a molecular explanation for why certain mutations of Mettl3 and Mettl14 lead to impaired function of the methyltransferase complex.
Display omitted
•Structures of Mettl3 and Mettl14 complexes show an extensive interface•Crystal structures with bound SAM or SAH identify the active site of Mettl3•Catalytic site of Mettl3, but not Mettl14, is critical for methylation•Mettl14 is critical to support Mettl3 structurally and recognize RNA substrates
Wang et al. reveal crystal structures of Mettl3/Mettl14 complexes. Extensive intermolecular contact enables Mettl3 and Mettl14 to work cooperatively. Mettl3 is the catalytic subunit, and Mettl14 activates Mettl3 via allostery and recognition of RNA substrates. They explain why certain mutations, including those involved in cancer, affect RNA methylation.
Zipf's Law in Passwords Wang, Ding; Cheng, Haibo; Wang, Ping ...
IEEE transactions on information forensics and security,
2017-Nov., 2017-11-00, Letnik:
12, Številka:
11
Journal Article
Recenzirano
Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a substantial step ...forward toward understanding this foundational question. By introducing a number of computational statistical techniques and based on 14 large-scale data sets, which consist of 113.3 million real-world passwords, we, for the first time, propose two Zipf-like models (i.e., PDF-Zipf and CDF-Zipf) to characterize the distribution of passwords. More specifically, our PDF-Zipf model can well fit the popular passwords and obtain a coefficient of determination larger than 0.97; our CDF-Zipf model can well fit the entire password data set, with the maximum cumulative distribution function (CDF) deviation between the empirical distribution and the fitted theoretical model being 0.49%~4.59% (on an average 1.85%). With the concrete knowledge of password distributions, we suggest a new metric for measuring the strength of password data sets. Extensive experimental results show the effectiveness and general applicability of the proposed Zipf-like models and security metric.