In single-pixel imaging (SPI) systems, the traditional free-space photodetector can be easily interfered. Its size and configuration limit its applications in complex and restricted scenarios. In ...this study, we develop an SPI based on optical fibers. We use a single inclined face optical fiber as an SPI detection device to realize multidimensional remote imaging in slim channels. This system is immune to interference from external ambient lights, and it is flexible to be moved and rotated to implement endoscopic observation inside various narrow spaces, such as fluid tubes and electronic device gaps. Furthermore, it can be used in medical endoscopic imaging and medical intervention therapy.
Resistance to tyrosine kinase inhibitor (TKI) is a tough problem in the treatment of chronic myeloid leukemia in blastic phase (CML-BP), which was often associated with acquired mutations in the ...kinase domain and not eliminating the leukemic stem cells. The efficacy of TKI or combination with chemotherapy in CML-BP remains unsatisfactory. Chimeric antigen receptor T (CAR-T) cell immunotherapy may overcome TKI and chemotherapy resistance. However, lack of ideal targetable antigens is a major obstacle for treating patients with myeloid malignancies. CD38 is known to be expressed on most (acute myeloid leukemia) AML cells, and its lack of expression on hematopoietic stem cells renders it as a potential therapeutic target for myeloid CML-BP. We develop a CD38-directed CAR-T cell therapy for AML, and two patients with myeloid CML-BP were enrolled (NCT04351022). Two patients, harboring
and
mutation in the
kinase domain, respectively, were resistant to multiple TKIs (imatinib, dasatinib, nilotinib, and ponatinib) and intensive chemotherapy. The blasts in the bone marrow of two patients exhibited high expression of CD38. After tumor reduction chemotherapy and lymphodepletion chemotherapy, 1 × 10
CAR-T-38 cells per kilogram of body weight were administered. They achieved minimal residual disease-negative and
-negative complete remission and experienced grade II cytokine release syndrome manifesting as fever. Our data highlighted that CAR-T-38 cell therapy may overcome TKI and chemotherapy resistance in patients with myeloid CML-BP.
To investigate clinical characteristics and outcomes of transplantation in AML patients with
FLT3
-ITD/
DNMT3A
double mutation, we retrospectively analyzed 206 Chinese patients with AML after Sanger ...sequencing. Our analysis showed that AML patients with
FLT3
-ITD and
DNMT3A
R882 mutations had a higher white blood cell count and a lower complete remission (CR) rate after first induction chemotherapy. All 206 patients received allogeneic hematopoietic stem cell transplantation (allo-HSCT) in status of CR. These results indicate that AML patients with
FLT3
-ITD and
DNMT3A
R882 double mutation show a higher 2-year cumulative incidence of relapse (CIR), lower 2-year overall survival (OS) rate, and lower 2-year leukocyte-free survival (LFS) after allo-HSCT. The univariate and multivariate analyses confirmed that disease status prior to transplantation,
FLT3
-ITD,
FLT3
-ITD, and
DNMT3A
R882 double mutation were independent factors for poor prognosis after allo-HSCT. In summary, the present cohort study demonstrated that
FLT3
-ITD and
DNMT3A
R882 double mutation predicts poor prognosis in Chinese AML patients receiving chemotherapy or allo-HSCT treatment.
Wireless sensor networks are a promising application of the Internet of Things in the sustainable development of smart cities, and have been afforded significant attention since first being proposed. ...Authentication protocols aim to protect the security and confidentiality of legitimate users when accessing and transmitting data. However, existing protocols may suffer from one or more security flaws. Recently, Butt et al. proposed an energy-efficient three-factor authentication protocol for wireless sensor networks. However, their protocol is vulnerable to several attacks, and lacks certain security properties. In this paper, the causes of these design flaws are analyzed. Furthermore, we propose a novel three-factor authentication protocol (password, smart card, and biometric information) for wireless sensor networks in Internet of Things contexts. A dynamic anonymous strategy is designed to prevent privacy disclosure and to resist sensor node capture attacks, tracking attacks, and desynchronization attacks. The Find–Guess model and random oracle model are combined to prove the security of the proposed protocol. A comparative analysis with related schemes shows that the proposed protocol has higher security and is able to maintain a low computational overhead.
Abstract
Tomato spotted wilt virus (TSWV) is a plant pathogen that causes devastating tomato yield losses worldwide. The
Sw-5b
gene is one of the most effective resistance genes for TSWV control in ...tomato plants, and has been widely used in resistance breeding. Molecular markers are specific DNA sequences with known locations on the chromosome; they are indispensable tools in marker-assisted selection, which detects the presence of target genes to expedite breeding. We developed gene-specific molecular markers for
Sw-5b
to facilitate the accurate distinction of resistance (
Sw-5b
R
) and susceptibility (
Sw-5b
S
) alleles of
Sw-5b
. Using these markers, we successfully detected
Sw-5b
and determined its genotype (homozygous
Sw-5b
R
, heterozygous
Sw-5b
R/S
, or homozygous
Sw-5b
S
) in six tomato varieties. Then we successfully applied these markers to 46 commercial tomato cultivars to detect and determine the genotype of
Sw-5b
. The results revealed a striking absence of the
Sw-5b
R
gene and high TSWV susceptibility among most of the analyzed commercial cultivars. With the assistance of the novel
Sw-5b
-specific molecular markers, we generated a TSWV-resistant and homozygous
Sw-5b
R
Micro-Tom tomato line, demonstrating the practical application of these markers in plant breeding. In summary, we developed novel gene-specific molecular markers for
Sw-5b
, and applied them to distinguish
Sw-5b
alleles for TSWV resistance or susceptibility. This marker set provides a valuable tool for breeding TSWV-resistant tomato varieties.
Vehicular Ad-hoc Networks (VANETs) enable the connection and information exchange between vehicles and transportation infrastructure (V2I), vehicle and vehicle (V2V) to improve the safety and ...efficiency of the transportation system. In previous protocols, V2I and V2V authentication protocols based on bilinear pairings or identity-based cryptography are computationally heavy or difficult to protect the user's identity and privacy. In addition, lightweight authentication protocols have not achieve both V2I and V2V authentication, and may suffer from Onboard Unit (OBU) intrusion attacks, Roadside Unit (RSU) captured attacks, and difficult to track malicious vehicles. Therefore, a lightweight and anonymous V2I and V2V authentication protocol with batch verification based on Elliptic Curves Cryptography (ECC) is proposed. We use Physical Unclonable Function (PUF) and biological key to avoid RSU captured attacks and OBU intrusion attacks, design a feature embedding strategy with dynamic pseudo-identity to recover the malicious vehicle's identity by the Trusted Authority (TA). In the application test simulating the actual scenario, our protocol is more efficient because of lower overhead and batch authentication strategy. The semantic security of the protocol is formally proved under the random oracle model. The comparative analysis and security proof results show that our protocol is more superior to others.
Myeloproliferative neoplasms (MPNs) with concurrent BCR‐ABL1 fusion gene and CALR mutation are especially rare. We report a patient with coexisting BCR‐ABL1 fusion gene, CALR, and TET2 mutations who ...was treated with the combination of the second‐generation TKI nilotinib and JAK1/JAK2 inhibitor ruxolitinib.
An ultra-high birefringent D-shaped microfiber device with birefringence over 4 × 10 −2 and insertion loss down to 0.2 dB is proposed and experimentally demonstrated. When the all-fiber-compatible ...device gets applied into a linear single-short fiber laser cavity, dual-comb with large repetition rate up to 431 MHz and high repetition-rate-difference over 250 kHz are realized. The single-cavity laser exploits high birefringence of the device to boost building of asynchronous combs through the polarization-multiplexing method. The achieved repetition-rate-difference is several orders of magnitude larger than previous works, revealing the potential to enhance acquisition rate of certain dual-comb measurement application scenarios.