A Hill Cipher Modification Based on Eigenvalues ...(IJCNIS-V6-N5-8)
水杉种群数量和遗传结构研究-浙江天童森林生态系统国家野外科学观测
关键词:数量结构、遗传结构、人工和自然种群、RAPD、叶绿体 DNA、水杉
ABSTRACT
Dawn redwood (Metasequoia glyptostroboides), a living fossil endemic to China, has been planted extensively all over the world since it was found in 1940's. In this paper, we analyze the demographic structure of wild M. glyptostroboides populations as well as genetic structures of wild and artificial populations using RAPD markers, and want (1) to understand the regeneration of natural populations; (2) to know whether the genetic structure of M. glyptostroboides has been recovered as the quantity and distribution did; and (3) to provide some suggestions on the recovery of endangered species. Age structures of wild M. glyptostroboides populations indicate that they are declining due to difficulty in regeneration. D iameter-at-breast-height (DBH) of the largest tree in the sampled populations is 176.03cm. There is no naturally-regenerated seedlings and saplings with DBH less than 10cm, in wild populations. However, many seedlings and saplings were found in the investigated plots. Loss of suitable habitats led by human activities and succession made wild populations face extinction. A human-aided natural regeneration strategy was suggested to protect the wild populations. A total of 7 primers were used which produced 58 bands among all the 81 individuals of 8 wild populations tested. The percentage of polymorphic loci for wild populations was 87.93%; The number of effective alleles was 1.53; The expected heterozygosity was 0.3166; and Shannon index was 0.4761. GST is 0.2442, indicating that most of the genetic diversity was within populations. A lower genetic variation (HS=0.2341) than gymnosperms (HS=0.386) was found in wild populations, indicating the effects of glaciations, and recent habitat loss and fragmentation led by human activities. The same of primers were used in 64 individuals of 3 artificial populations. The percentage of polymorphic loci, number of effective alleles, expected heterozygosity, Shannon index and GST were 81.03%, 1.49, 0.2943, 0.4395 and 0.1729, respectively. Lower genetic diversity in artificial populations than wild populations might be due to biased seed collection and asexual propagation. Genetic distance of artificial populations (D=0.0925) was lower than that of wilds (D=0.1092). AMOVA indicated that 66.48% of total genetic variance is within populations, 15.68% among populations and 17.84% between wild and artificial populations. UPGMA distinguished the wild and the artificial populations into two distinct groups. Mixture of seeds from different populations, a few of source trees and sole seedling or seed source in the process of reintroduction may explain above results. The cpDNA in partial M. glyptostroboides individuals had been amplified by one pair of universal primer (petG-trnP), whose GenBank accession number is AY291319, but the obtained sequences in all individuals were the same. The above research indicates that the artificial and wild populations have distinct genetic
基于Atmel单片机的无线遥控密码锁设计
3 软 件 设 计
电子密码锁软件设计 由主程序 、初始化程序 、
LCD显示 程序 、键 盘扫 描 程序 、键 功 能 程 序 、密 码设 置程 序 、EPROM 读 写程 序和延 时程 序等组 成 。主程
序设 计 流程 图如 图 4所 示 。
4 结 束 语
本文 提 出了一 种新 型遥控 电子 密码锁 的设 计方
中图分 类号 :TP368.1 文献标识码 :A 文章编 号 :1009—2552(20H )09—0089—03
2011年第9期
基 于 Atmel单 片 机 的 无 线 遥 控 密 码 锁 设 计
赵 超
(南京信息工程大学 电子与信息工程学 院 ,南京 210044)
摘 要 :研 究 并设计 一种 基 于单 片 机 的遥 控 电子 密码 锁 ,给 出 了 系统设 计 方 案 、硬 件设 计 及 单 片机 程序 流程 。能 够 实现 密码修 改 、按 键 提 示 、 密码 错 误 报 警 、超 次提 示、本 机 开锁 、遥 控 开 锁 等 功 能。 实践 证 明 ,该 密码锁 具 有设 计方 法合 理 、简单 易行 、成 本低 、使 用安全 等特 点 。 关键 词 :电子 密码锁 ;遥控 ;单 片机 ;报警
图 1 硬件 系统 原理
图 2 系统电源原理
2.3 键盘 扫描 电路 密码 锁 的密码输 入 与修 改等 功能 由矩 阵键盘 完
成 。矩 阵键盘部分 由单片机程序扫描键盘 ,确定被 按 按键 的具 体 位置 ,并 具 有 消 抖 和 判 断 闭合 的键 是 否释放 等 功 能 。 2.4 液 晶显 示 电路
系统 的显 示 部 分 由液 晶显 示 器 LCD1602来 完 成 ]。,从经 济节 能 的角 度 考 虑 ,密 码锁 没有 进 行 操 作 时液晶显示器始终处于关闭状态。当密码锁有操 作 时液 晶显示 器才 开启 。 2.5 密码 存储 电路
信息安全工程师英语词汇
信息安全工程师英语词汇Information Security Engineer English VocabularyIntroductionIn today's digital era, information security plays a critical role in safeguarding sensitive data from unauthorized access, alteration, or destruction. As technology continues to advance, the need for highly skilled professionals, such as Information Security Engineers, has become increasingly important. These professionals possess a vast knowledge of English vocabulary used in the field of information security. This article aims to provide an extensive list of English words and phrases commonly used by Information Security Engineers.1. Basic Terminology1.1 ConfidentialityConfidentiality refers to the protection of information from unauthorized disclosure. It ensures that only authorized individuals have access to sensitive data.1.2 IntegrityIntegrity refers to maintaining the accuracy, consistency, and trustworthiness of data throughout its lifecycle. It involves preventing unauthorized modification or alteration of information.1.3 AvailabilityAvailability refers to ensuring that authorized users have access to the information they need when they need it. It involves implementing measures to prevent service interruptions and downtime.1.4 AuthenticationAuthentication is the process of verifying the identity of a user, device, or system component. It ensures that only authorized individuals or entities can access the system or data.1.5 AuthorizationAuthorization involves granting or denying specific privileges or permissions to users, ensuring they can only perform actions they are allowed to do.2. Network Security2.1 FirewallA firewall is a network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules. It acts as a barrier between internal and external networks, protecting against unauthorized access.2.2 Intrusion Detection System (IDS)An Intrusion Detection System is a software or hardware-based security solution that monitors network traffic for suspicious activities or patterns that may indicate an intrusion attempt.2.3 Virtual Private Network (VPN)A Virtual Private Network enables secure communication over a public network by creating an encrypted tunnel between the user's device and the destination network. It protects data from being intercepted by unauthorized parties.2.4 Secure Socket Layer/Transport Layer Security (SSL/TLS)SSL/TLS is a cryptographic protocol that provides secure communication over the internet. It ensures the confidentiality and integrity of data transmitted between a client and a server.3. Malware and Threats3.1 VirusA computer virus is a type of malicious software that can replicate itself and infect other computer systems. It can cause damage to data, software, and hardware.3.2 WormWorms are self-replicating computer programs that can spread across networks without human intervention. They often exploit vulnerabilities in operating systems or applications to infect other systems.3.3 Trojan HorseA Trojan Horse is a piece of software that appears harmless or useful but contains malicious code. When executed, it can provide unauthorized access to a user's computer system.3.4 PhishingPhishing is a fraudulent technique used to deceive individuals into providing sensitive information, such as usernames, passwords, or credit card details. It often involves impersonating trusted entities via email or websites.4. Cryptography4.1 EncryptionEncryption is the process of converting plain text into cipher text using an encryption algorithm. It ensures confidentiality by making the original data unreadable without a decryption key.4.2 DecryptionDecryption is the process of converting cipher text back into plain text using a decryption algorithm and the appropriate decryption key.4.3 Key ManagementKey management involves the generation, distribution, storage, and revocation of encryption keys. It ensures the secure use of encryption algorithms.5. Incident Response5.1 IncidentAn incident refers to any event that could potentially harm an organization's systems, data, or users. It includes security breaches, network outages, and unauthorized access.5.2 ForensicsDigital forensics involves collecting, analyzing, and preserving digital evidence related to cybersecurity incidents. It helps identify the cause, scope, and impact of an incident.5.3 RemediationRemediation involves taking actions to mitigate the impact of a security incident and prevent future occurrences. It includes removing malware, patching vulnerabilities, and implementing additional security controls.ConclusionAs Information Security Engineers, a strong command of English vocabulary related to information security is crucial for effective communication and understanding. This article has provided an extensive list of terms commonly used in the field, ranging from basic terminology to network security, malware, cryptography, and incident response. By mastering these words and phrases, professionals in the field can enhance their knowledge and contribute to the protection of sensitive information in today's ever-evolving digital landscape.。
不同地区桃树根际土壤微生物群落结构及多样性分析
第44卷,第1期2024年1月栽培生理Cultivation Physiology中国果菜China Fruit &Vegetable不同地区桃树根际土壤微生物群落结构及多样性分析徐海忠2,薛彦华2,丁洪发2,戚恒瑞1,李天昊1,毛伟健1*,程凡升1*(1.青岛农业大学食品科学与工程学院,山东青岛266109;2.山东天同食品有限公司,山东临沂276000)摘要:植物根际土壤微生物群落能够加速根际营养元素的循环,调节土壤肥力。
分析桃树根际土壤微生态结构,可以为桃树种植土壤改良提供依据。
利用高通量测序技术对临沂市李官、汤头、沂水3个地区桃园根际土壤微生物多样性和群落组成进行分析。
经筛选和去除嵌合体后,得到了425267条优质序列,这些序列的长度主要集中在400~450bp 。
在3个地区的样品中共鉴定出4175个操作性分类单元(OTU )。
物种分类结果显示,细菌包括25个门、54个纲、145个目、272个科、497个属和577个物种。
在临沂不同地区的桃树根际土壤样品中,细菌群落组成和结构存在一定差异,细菌丰富度和多样性的顺序为汤头>沂水>李官。
细菌群落中,线菌门和变形菌门的丰度之和达到50.37%~66.07%,属于绝对优势菌门。
根据COG 功能分类统计,土壤细菌的功能基因主要集中在新陈代谢、遗传信息和细胞信号传导等方面。
总体而言,桃根际土壤的细菌多样性和群落组成在不同地区之间存在差异。
关键词:桃树;土壤;根际微生物;16S rRNA 测序中图分类号:TS201.3文献标志码:A文章编号:1008-1038(2024)01-0072-08DOI:10.19590/ki.1008-1038.2024.01.015Microbial Community Structure and Diversity of Peach RhizosphereSoil in Different RegionsXU Haizhong 2,XUE Yanhua 2,DING Hongfa 2,QI Hengrui 1,LI Tianhao 1,MAO Weijian 1*,CHENG Fansheng 1*(1.College of Food Science and Technology,Qingdao Agricultural University,Qingdao 266109,China;2.Shandong Tiantong Food Co.,Ltd.,Linyi 276000,China)Abstract:Plant rhizosphere soil microbial community can accelerate the circulation of rhizosphere nutrients andregulate soil fertility.The analysis of rhizosphere soil microecological structure of peach trees can effectively improve the planting soil of peach trees.The rhizosphere soil microbial diversity and community composition of收稿日期:2023-06-11基金项目:山东省重点研发计划-乡村振兴科技创新提振行动计划(2022TZXD0012);青岛特种食品研究院揭榜挂帅项目(6602422201)第一作者简介:徐海忠(1983—),男,工程师,本科,主要从事果蔬深加工方面的研究工作*通信作者简介:毛伟健(2000—),男,硕士,主要从事食品生物技术方面的研究工作程凡升(1983—),男,教授,博士,主要从事食品生物技术方面的教学与研究工作人类活动引起的全球变化包括大气二氧化碳浓度升高、气候变暖、降水变化、干旱和大气氮沉降增加,是全球范围内生物多样性丧失的主要因素[1]。
杭州联合银行英文介绍
• • • •
Primary function Individuals to apply basic conditions Application process Harvest credit card features
• primary function: 1.consumption settlement: the cardholder can both at home and abroad with a "union pay" accept freelance merchants consumption logo. 2. transfers : cardholders may apply to the specified account transfer of funds.
Individuals to apply basic conditions:
1. main card, the claimant must be at least eighteen years of age (inclusive) or more, with full civil capacity of the individual; Vice card is required to apply 16 years of age and the claimant by the main card or the principal cardholder agreement.
• Harvest credit card features: 1. use harvest borrow write down card besides calibration signature using a password, besides with card double security. 2 .harvest borrow write down card longest avoid breath period for 56 days. 3. what overdraw cash can enjoy 10% for your minimum payment, by now costs reduced.
香蕉果实类受体蛋白激酶基因克隆及RNAi载体构建_王必尊
植物类受体蛋白激酶(receptor-like protein kinase RLKs )是一类由胞外结构域、跨膜结构域和胞内激酶域组成的蛋白质[1]。
该类激酶绝大部分定位于细胞质膜上[2],极少数胞质类受体激酶亚族中的一些激酶定位于细胞质中[3]。
植物类受体蛋白激酶胞外结构域识别和接收信号,跨膜结构域使蛋白定位于质膜上,并将识别的信号传递给胞内的激酶域,胞内激酶域接受信号激活磷酸化,通过磷酸化作用将信号传递给下一级信号传递体[4]。
到目前为止,已经从拟南芥、水稻、小麦等多种高等植物中克隆出大量的RLKs 基因,它们在高等植物生长发育和环境刺激的信号转导中起着重要的作用[5]。
自1990年第一个RLK 基因从玉米中分离出来后,对植物体中RLKs 的研究已取得长足的进展[6]。
RLKs 在植物自交不亲和、植物组织器官的形成和发育,以及植物细胞对各种刺激信号转导过程是目前研究的热点[7]。
研究发现许多植物激素的信号转导都有蛋白激酶的参与[7-9]。
迄今为止已克隆出两种植物激素受体蛋白基因CTR1和ETR1[10]。
CTR1是植物细胞分裂素受体,参与细胞分裂素调控的多种植物发育过程。
ETR1是乙烯激素的受体,是乙烯作用过程中信号传递的主要载体,参与乙烯调控多种生理功能。
植物类受体蛋白激酶还参与植物生长发育及对环境应答反应的多种信号传导过程,在植物生命活动中发挥着重要的生物学功能[11]。
植物类受体蛋白激酶在是否参与香蕉果实的成熟的信号传导过程和香蕉果实成熟过程目前还未见有报道。
本研究在前热带作物学报2013,34(10):1919-1924Chinese Journal of Tropical Crops收稿日期2013-07-02修回日期2013-08-31基金项目海南省重点科技计划项目(No.ZDXM20120024);海南省重大科技项目子课题“热带生物种质与基因资源研究”(No.ZDZX2013023-1)。
仿射加密算法原理
仿射加密算法原理一、引言在信息时代,数据安全问题一直备受关注。
为此,加密技术得到了广泛应用。
仿射加密算法是一种流行的加密算法,它具有简单、快速、安全等优点。
本文将介绍仿射加密算法的原理及其加密过程,并针对该算法的优缺点进行探讨。
二、基本原理1. 线性变换仿射加密算法是基于线性变换的加密算法。
线性变换指的是对向量或矩阵进行的一种数学操作,可以用线性方程组表示。
具体而言,就是线性变换将向量或矩阵变换为另一个向量或矩阵,变换后的向量或矩阵与原始向量或矩阵之间存在一定的线性关系。
在仿射加密算法中,通过选择合适的线性变换,可以实现对明文的加密。
2. 明文加密过程在仿射加密算法中,加密过程分为以下几个步骤:(1)选择两个正整数a和b(这两个数要求互质);(2)将明文m分解为若干组,每组加密如下:C = (am + b) mod nn是最大取值。
3. 密文解密过程由于仿射加密算法也是一种对称加密算法,因此密文解密的过程与加密过程类似,但是需要构造一个解密变换。
解密变换如下:m = ((C - b) * a^(-1)) mod na^(-1)是a的逆元(互质情况下,a和n一定存在逆元)。
三、优缺点和应用1. 优点(1)加密速度较快:仿射加密算法只涉及到简单的模运算和乘法运算,因此加密速度较快。
(2)加解密易于实现:仿射加密算法的数学原理比较简单,因此实现起来相对容易。
(3)加密强度较高:仿射加密算法通过选择合适的a和b可以实现随机化加密,相对比较安全。
2. 缺点(1)加密强度不太高:仿射加密算法具有一定的加密强度,但是相对于其他加密算法来说,它较容易被攻击。
(2)加密密钥选择较为有限:仿射加密算法中a和b的选择比较有限,要求a和n必须是互质的,因此加密密钥的数量比较少。
3. 应用仿射加密算法主要用于对不太敏感、名称等信息进行加密。
仿射加密算法可用于保护论文、报告等文件的机密性,也可用于网络通讯中的数据加密。
但对于重要的商业机密等敏感信息,仿射加密算法的加密强度可能不够,仍需使用更加安全的加密算法。
嵌入式3D打印多孔硅胶义眼台及其表面修饰
眼部的重度创伤、严重感染、重度眼球萎缩、恶性肿瘤晚期等均可能造成眼球不可逆损伤,常需要将病变眼球摘除[1]。
眼球摘除后不仅导致患者病变侧视力缺失,还会影响面容美观,给患者造成巨大的心理负担[2]。
义眼台可代替眼窝体积、改善面部容貌,成为眼球缺失后整形修复的首选[3]。
羟基磷灰石和高密度聚乙烯是义眼台的常用材料,但二者造价昂贵且力学强度明显高于眼周组织,植入术后常引发出血、感染、眼周组织坏死等并发症[3,4]。
硅胶是一种生物相容性良好且价格低廉的弹性材料,更接近人体眼周组织的力学强度(0.72~1.28Mpa ),用于义眼台制备不仅降低了制造成本且可有效避免上述并发症[5-7]。
但硅胶的疏水特性不利于植入后的细胞组织黏附,无孔硅胶义眼台植入术后常伴随极高Embedded 3D printing of porous silicon orbital implants and its surface modificationZHAO Hong 1,2,WANG Yilin 2,WANG Yanfang 3,GONG Haihuan 2,YINJUN Feiyang 2,CUI Xiaojun 1,ZHANG Jiankai 1,HUANG Wenhua 1,21Department of Human Anatomy,School of Basic Medical Sciences,Guangdong Medical University,Dongguan Key Laboratory of Stem Cell and Regenerative Tissue Engineering,Dongguan 523808,China;2National Key Discipline of Human Anatomy,School of Basic Medical Sciences,Southern Medical University,Guangdong Provincial Key Laboratory of Digital Medical and Biomechanics,Guangdong Engineering Research Center for Translation of Medical 3D Printing Application,Guangzhou 510515,China;3Guangdong Provincial People's Hospital Affiliated to Southern Medical University,Guangdong Academy of Medical Science,Guangzhou 510080,China摘要:目的制备个性化多孔硅胶义眼台并探讨表面修饰对硅胶义眼台性能的影响。
HRAC-Classification of Herbicides According to Mod
Classification of Herbicides According to Mode of ActionFarmers, advisors and researchers should know which herbicides are best suited to combat specific resistant weeds. To support the use of herbicides suitable for resistance management the enclosed classification of herbicides is proposed.The herbicides are classified alphabetically according to their target sites, modes of action, similarity of induced symptoms or chemical classes.If different herbicide groups share the same mode or site of action only one letter is used. In the case of photosynthesis inhibitors subclasses C1, C2 and C3 indicate different binding behaviour at the binding protein D1 or different classes. Bleaching can be caused by different ways. Accordingly subgroups F1, F2 and F3 are introduced. Growth inhibition can be induced by herbicides from subgroups K1, K2 and K3. Herbicides with unknown modes or sites of action are classified in group Z as "unknown" until they can be grouped exactly.Classification of HerbicidesIn order to avoid confusion with I and O categories J and Q are omitted. New herbicides will be classified in the respective groups or in new groups (R, S, T...).Since the system was in part developed in co-operation with the "Weed Science Society of America (WSSA)" new herbicides should be categorised jointly by HRAC and WSSA.For reference the numerical system of the WSSA is listed, too.The aim of HRAC is to create a uniform classification of herbicide modes of action in as many countries as possible.Such a classification system can be useful for many instances but there are cases where weeds exhibit multiple resistance across many of the groups listed and in these cases the key may be of limited value.The system itself is not based on resistance risk assessment but can be used by the farmer or advisor as a tool to choose herbicides in different mode of action groups, so that mixtures or rotations of active ingredients can be planned.For a figure of the chemical groups involved each HRAC Group, click on the letter in the table below. A synoptic graphic of the HRAC groups is also available.The WSSA and HRAC systems differ in minor ways. Herbicides in italics are listed on the HRAC classification system but are not listed on the WSSA classification.January 2005 HRAC: Herbicide classificationRemarks:According to information and comments following herbicides are classified in the January 2005 version in HRAC (WSSA) groups:B (2): cancelled: #9; #9; procarbazone Approved ISO name: propoxycarbazone E (14): cancelled: pyrazogyl Approved name: pyraclonil。
211126664_山苍子精油抑制黄曲霉菌的生长和产毒作用研究
黄晓霞,彭伟斌,李振宇,等. 山苍子精油抑制黄曲霉菌的生长和产毒作用研究[J]. 食品工业科技,2023,44(9):160−166. doi:10.13386/j.issn1002-0306.2022060269HUANG Xiaoxia, PENG Weibin, LI Zhenyu, et al. Inhibitory Effect of Litsea cubeba Essential Oil on Aspergillus flavus Growth and Aflatoxin Production[J]. Science and Technology of Food Industry, 2023, 44(9): 160−166. (in Chinese with English abstract). doi:10.13386/j.issn1002-0306.2022060269· 生物工程 ·山苍子精油抑制黄曲霉菌的生长和产毒作用研究黄晓霞1,2,彭伟斌1,李振宇1,杨东润1,杨世锟1(1.嘉应学院化学与环境学院,广东梅州 514015;2.广东省山区特色农业资源保护与精准利用重点实验室,广东梅州 514015)摘 要:山苍子精油是一种纯天然植物精油,本文研究了其对黄曲霉生长、代谢和毒素产生的抑制作用,探讨了山苍子精油对黄曲霉菌的抑菌能力和作用机理。
本研究将花生放置于自然环境染菌并分离纯化目标菌,采用形态学并结合ITS 序列法进行菌株分类鉴定;结合抑菌圈、抑菌率和最低抑菌浓度(MIC )的测定探讨山苍子精油对黄曲霉菌的抑制能力;进行了山苍子精油影响黄曲霉孢子萌发率、生长曲线和黄曲霉毒素B1产生的实验研究;从细胞膜渗透性、细胞酶活性的变化探讨了山苍子精油抑制黄曲霉的作用机理。
实验结果表明:从腐败花生中分离筛选出菌株HB 2,经ITS 序列法鉴定为黄曲霉(Aspergillus flavus );黄曲霉素测定结果显示其含有黄曲霉素B1(AFB1),质量浓度为3.4×103 μg·kg −1(纯湿菌体);抑菌圈随精油浓度的增大明显变大,对黄曲霉的最低抑菌体积分数(MIC )为0.800 μL·mL −1;孢子萌发率、牙管长度、黄曲霉菌体的生长量和AFB1的浓度随培养液中精油浓度的增大呈显著下降趋势,当山苍子精油浓度为0.100 μL·mL −1时,肉眼看不到菌体生长;随精油浓度的增大,培养液电导率增大、还原糖利用率和菌体蛋白质含量减少、菌体内苹果酸脱氢酶和琥珀酸脱氢酶活性降低。
大数据系列SSCI一区郭旨龙:基于自动人脸识别的警务
大数据系列SSCI一区郭旨龙:基于自动人脸识别的警务(感谢张法官题字)郭旨龙| 中国政法大学网络法研究中心研究员,刑法学硕士生导师。
学术兴趣为网络刑事法、数据信息法、人工智能法。
英国格拉斯哥大学法学博士。
多次为我国参加联合国网络犯罪公约会议提供专家建议,接受央视(英语)新闻频道和《人民日报海外版》采访。
在《Legal Studies》《Artificial Intelligence and Law》《法制与社会发展》《法律科学》《政治与法律》《当代法学》《法学论坛》《法学杂志》《东方法学》《国家检察官学院学报》等核心期刊发表论文16篇,获《高等学校文科学术文摘》《人大复印报刊资料》等文摘转载8篇。
合著3部著作。
本文发表于国际顶刊Artificial Intelligence and Law(《人工智能与法律》)。
感谢郭老师授权“司法兰亭会”推送。
Artificial Intelligence and Law(《人工智能与法律》)发表中国政法大学郭旨龙老师的论文Policing based on automatic facial recognition(《论警用自动人脸识别》)。
该刊为SSCI数据库收录于法学类一区(最新影响因子排名:19/154)。
该刊同时为SCI数据库收录。
论文共47页,22000余单词。
该文以英国警方部署的自动人脸识别大规模试验引发的诉讼为线索,依据功能蠕变(function creep)的技术、社会与法律相融合视角,同时借鉴刑法上的重罪、轻罪划分,对基于自动人脸识别的治安警务的法治文明问题进行了研究。
在写作和修改过程中,作者有幸得到英国大律师Lewis Kennedy 博士的及时合作,英国谢菲尔德大学法学院讲师陈家宏博士、日本筑波大学信息原则与设计系副教授于海涛博士、中国西湖大学工学院助理教授原发杰博士的倾心帮助。
论文图表绘制得到了陈恒星的多次帮助。
原文致谢了北京师范大学汪庆华教授、西南政法大学梁坤教授、华中科技大学李雅男博士、吉林大学谢登科教授、中国政法大学李莉副教授的会议邀请。
园艺英语试题及答案大全
园艺英语试题及答案大全一、选择题(每题2分,共20分)1. The term "perennial" refers to a plant that lives for:A. One yearB. Two yearsC. More than two yearsD. Less than a year答案:C2. Which of the following is a common method of plant propagation?A. SeedB. BulbC. CuttingD. All of the above答案:D3. The process of grafting involves joining two plant parts so that they:A. Grow togetherB. Form a new plantC. DieD. Produce fruit答案:B4. What is the primary role of fertilizer in plant growth?A. Provide waterB. Provide nutrientsC. Provide lightD. Provide air答案:B5. The term "chlorophyll" is associated with:A. PhotosynthesisB. RespirationC. TranspirationD. Osmosis答案:A6. Which of the following is not a type of soil?A. SandyB. ClayC. LoamyD. Aquatic答案:D7. The purpose of pruning plants is to:A. Remove dead leavesB. Encourage growthC. Improve appearanceD. All of the above答案:D8. What is the main benefit of mulching in gardening?A. Provides shadeB. Retains moistureC. Increases temperatureD. Attracts insects答案:B9. The abbreviation "HD" in horticulture usually stands for:A. High DensityB. Heavy DutyC. HardyD. High Demand答案:C10. Which of the following is a common disease affecting plants?A. RustB. MildewC. BlightD. All of the above答案:D二、填空题(每空1分,共10分)1. The scientific classification of plants is known as__________.答案:Binomial nomenclature2. A plant that is grown for its flowers is called an__________.答案:Ornamental plant3. The process by which plants convert sunlight into energy is called __________.答案:Photosynthesis4. The part of the plant that absorbs water and nutrients is the __________.答案:Root5. The __________ is the process of a plant's growth and development.答案:Life cycle6. A plant that is adapted to dry environments is known as a __________.答案:Xerophyte7. The practice of growing plants in a greenhouse is called __________.答案:Hydroponics8. The study of plant diseases is known as __________.答案:Plant pathology9. The __________ is the central part of a flower, containing the reproductive organs.答案:Pistil10. A plant that is grown for its edible parts is called a__________.答案:Crop三、简答题(每题5分,共20分)1. What are the basic components of soil?答案:Soil is composed of a mixture of minerals, organic matter, water, and air.2. Explain the concept of photosynthesis.答案:Photosynthesis is the process by which green plants and some other organisms use sunlight to synthesize foods with the help of chlorophyll pigments.3. What are the main functions of a greenhouse in horticulture?答案:A greenhouse provides a controlled environment for growing plants, protecting them from harsh weather conditions and allowing for year-round cultivation.4. Describe the role of a gardener in maintaining a healthy garden.答案:A gardener is responsible for planting, watering, fertilizing, pruning, and protecting plants from pests and diseases to ensure a thriving garden.四、论述题(每题15分,共30分)1. Discuss the importance of proper watering techniques in plant care.答案:Proper watering is crucial for plant health as it ensures that plants receive the necessary hydration forgrowth and metabolism. Overwatering can lead to root rot, while underwatering can cause wilting and stress. Watering at the right time and in the right amount helps maintain soil structure and promotes healthy root development.2. Elaborate on the various methods of plant propagation and their applications.答案:Plant propagation can be achieved through various methods, including seed sowing, cuttings, layering, grafting, and division. Each method has its specific applications and is chosen based on the plant species and。
复方苁蓉益智胶囊治疗血管性痴呆的研究进展
血管性痴呆(vascular dementia,VD)是一种由脑血管病变导致的疾病,其临床症状包括引起记忆和执行功能障碍等。
它被认为是继阿尔茨海默病之后的第二大常见痴呆类型[1]。
目前,在亚洲和发展中国家的痴呆病例中,VD 约占30%,高于北美和欧洲(15%~20%)[2-3]。
据研究资料显示,我国60岁及以上人群的血管性痴呆发病率为每年每千人中有2.42例[4-5]。
研究表明,我国约有1507万人60岁以上的痴呆患者,其中约有392万人为VD 患者[6]。
VD 会造成日常生活质量不断下降,而且不能扭转,给家庭和社会带来极大的冲击和负担。
复方苁蓉益智胶囊是由王永炎院士多年临床实践研制的具有益智养肝,化浊活血和增智健脑等功效的中成药[7],主料何首乌、肉苁蓉、荷叶、地龙、漏芦等。
Progress of compound ciYizhi capsule in the treatment of vascular dementia Di Shuai, Zhang Jiapeng, Liu Yixuan, LiYanan, Zhang Jiang, Zhou Fuling. The Affiliated Hospital of North China University of Science and Technology, Tangshan 063000, China【Abstract 】Compound ciYizhi capsule has the effect of nourishing liver,promoting turbidity and activating blood, and increasing wisdom and brain. It is suitable for mild to moderate vascular dementia with liver and kidney deficiency and phlegm stasis blocking collateral syndrome. Recently, it has been widely used in the long-term and synergistic treatment of vascular dementia with remarkable efficacy.To summarizes the clinical and experimental studies of compound ciYizhi capsule. It is found that compound ciYizhi capsule can treat vascular dementia by reducing the expression of MARKS mRNA in hippocampus, inhibiting oxidative stress in brain tissue, protecting mitochondria, reducing the range of cerebral infarction, protecting cerebral ischemic injury and pound ciYizhi capsule combined with other anti-dementia drugs can significantly improve the clinical symptoms of patients with vascular dementia and improve the self-care ability and quality of life.In order to provide some reference for the subsequent study of compound cistanche qianyi capsule.【Key words 】Vascular dementia; Compound ciYizhi capsule; Dementia; Clinical application 复方苁蓉益智胶囊治疗血管性痴呆的研究进展邸帅 张佳朋 刘乙璇 李亚楠 张江* 周福玲作者单位:063000 河北省唐山市,华北理工大学附属医院神内二、四病区*通讯作者【摘要】 复方苁蓉益智胶囊具有益智养肝,化浊活血和增智健脑的功效,适用于肝肾亏虚兼痰瘀阻络证的轻中度血管性痴呆。
DNA甲基化及检测方法研究进展_李媛媛
DNA 甲基化及检测方法研究进展李媛媛,龚晓,包云飞,洪亚辉(湖南农业大学生物科学技术学院,湖南长沙410128)摘要:DNA 甲基化是一种重要的遗传修饰,是表观遗传学(epigenetics )研究的重要内容。
综述了目前常用的甲基化检测方法的原理及其在检测DNA 甲基化中的优缺点,如MSAP 检测方法、亚硫酸氢盐法、基因芯片技术等。
随着对表观遗传学研究的深入,DNA 甲基化检测方法也有了快速的发展,将有利于科学工作者更快更好的检测出DNA 甲基化。
关键词:DNA 甲基化;亚硫酸氢盐法;MSAP ;芯片技术中图分类号:Q75文献标识码:A 文章编号:1006-060X (2010)13-0015-03Research Advances of DNA Methylation and Its Detection MethodsLI Yuan-yuan,GONG Xiao,BAO Yun-fei,HONG Ya-hui(College of Bio-science and Technology,HNAU,Changsha 410128,PRC)Abstract:DNA methylation is an important genetic modification and an important part of epigenetics.The principles,advantages and disadvantages of common methylation detection methods (MSAP method,sodium bisulfite method and chip technology,etc.)were reviewed.With the further study on epigenetics,the detection method of DNA methylation has developed rapidly to detect DNA methylation faster and better.Key words:DNA methylation;sodium bisulfite method;MSAP;chip technology DNA 甲基化是一种重要的遗传修饰,是表观遗传学(epigenetics )研究的重要内容[1]。
藻类的采集和鉴定
不同水体定量样品的采集
对于一般富营养化调查,取水面以下0.5米处的水 样即可。 对于多样性调查,则要取生物多样性更高的地方, 所以多采取混合水样。 没有分层的浅水湖泊,每1米一个样取至水底上方 0.5米处。
有分层的水体,应取至透明度的1.5倍且包括斜温 层的深度。
Institute of hydrobiology, Jinan University
Monitoring Time Selection
Sampling frequency
According to different program
1-4 times/month
Institute of hydrobiology, Jinan University
Field Data Logbooks
For each visit to an individual station where field and/or samples are collected record the following: Station ID Sampling Date Location Sampling Depth (if other than surface) Sampling Time Sample Collector's Initials (if several persons in the region collect this data) Record of all measured field parameters and their respective values.
定性样品用孔径为 6μm 或10μm的浮游 生物网过滤获得。
Institute of hydrobiology, Jinan University
学籍管理系统例题
学籍管理系统毕业论文--------------前言--------------学生籍管理系统是一个教育单位不可缺少的部分,它的内容对于学校的决策者和管理者来说都至关重要,所以学生学籍管理系统应该能够为用户提供充足的信息和快捷的查询手段。
但一直以来人们使用传统人工的方式管理文件学籍,这种管理方式存在着许多缺点,如:效率低、保密性差,另外时间一长,将产生大量的文件和数据,这对于查找、更新和维护都带来了不少的困难。
随着科学技术的不断提高,计算机科学日渐成熟,其强大的功能已为人们深刻认识,它已进入人类社会的各个领域并发挥着越来越重要的作用。
作为计算机应用的一部分,使用计算机对学生学籍信息进行管理,具有着手工管理所无法比拟的优点.例如:检索迅速、查找方便、可靠性高、存储量大、保密性好、寿命长、成本低等。
这些优点能够极大地提高学生学籍管理的效率,也是企业的科学化、正规化管理,与世界接轨的重要条件。
因此,开发这样一套管理软件成为很有必要的事情,在下面的各章中我们将以开发一套学生学籍管理系统为例,谈谈其开发过程和所涉及到的问题及解决方法。
--------------摘要--------------学生学籍管理系统是典型的信息管理系统(MIS),其开发主要包括后台数据库的建立和维护以及前端应用程序的开发两个方面。
对于前者要求建立起数据一致性和完整性强、数据安全性好的库。
而对于后者则要求应用程序功能完备,易使用等特点。
本系统主要完成对学籍的管理,包括添加、修改、删除,查询,打印信息以用户管理等六个方面。
系统可以完成对各类信息的浏览、查询、添加、删除、修改等功能。
系统的核心是添加、修改和删除三者之间的联系,每一个表的修改都将联动的影响其它的表,当完成添加或删除操作时系统会自动地完成学籍的修改。
查询功能也是系统的核心之一,在系统中主要根据学生姓名和学号进行查询,其目的都是为了方便用户使用。
系统有完整的用户添加、删除和密码修改功能,并具备报表打印功能。
IJMSC-V7-N3-4
sharing of a secret key between Alice and Bob. Hill cipher [9, 13]is one of the oldest known polyalphabetic cipher
invented by Lester S. Hill [5], but it is well known that various attacks can be implemented on this cipher (e.g. known
plaintext attack)[20]. Despite all these vulnerabilities, it is still gaining the attention of many researchers because of its
Abstract: In this paper, we propose a novel variant of the Hill cipher based on vector spaces. In the classical Hill cipher,
a non-singular matrix is used for encryption but it is well known that this cipher is vulnerable to the known-plaintext
Non-singular Transformation Based Encryption
乳白石蒜17份种质资源的RAPD分析
白色 , 野生类 型 中花色 变异 丰富 , 且 是优 良的观赏植
物材 料 , 我 国主要 分布 于浙 江 、ቤተ መጻሕፍቲ ባይዱ在 江苏口 。前人 运用 ]
R D、S R等分 子 标 记 方 法 对 石 蒜 、 筒 石 蒜 等 AP I S 长
乳 白石 蒜 1 种 质 资 源 的 RAP 分 析 7份 D
刘 志高 童再 康 黄 华宏。 高 燕会 , , ,
(. 江 农 林 大 学 园林 学 院 ,浙 江 I 1浙 临安 3 1 0 ;2浙 江 农 林 大 学 林 业 与 生 物技 术 学 院 ,浙 江 临安 3 1 0 ) 130 . 1 3 0
西 北 林 学 院 学报 2 1 , 7 4 : 1 ~ 1 6 0 2 2 () 1 3 1
J u n Io rh s o e tyUnv r i o r a fNo t we tF rsr ie st y
d i1 . 9 9 jis . 0 17 6 . 0 2 0 . 1 o :0 3 6 /.sn 1 0 — 4 1 2 1 . 4 2
资料 。
应用 日益 受到 人们 的关 注 , 关 其 观赏 特 性 与 应用 有
收 稿 日期 : 0 10 - 3 修 回 日期 : 0 11 - 1 2 l—80 2 1 - 1 2 基 金 项 目 : 江 省 重 点 科技 创 新 团 队子 项 目 (O 1 0 3 3 ; 江 省 教 育 厅 项 目( 0 9 7 8 ) 校 发 基 金 : 子 注 入 对 石 蒜 属 植 物 花 、 浙 2 1 R50 40 ) 浙 Y2 0 0 6 3 ; 离 叶 变 异 的影 响研 究 ( 0 0 K0 8 。 2 1 F 4 ) 作 者 简 介 : 志 高 , , 师 , 士 , 究 方 向为 园 林 植 物 栽 培 应 用 的 教 学 与 研究 。E malvhg o s a Cr 刘 男 讲 硕 研 — i zia @ i .O : n n
酯化琼脂糖基支架材料的矿化及用于股骨修复的研究
题名(中英对照):酯化琼脂糖基支架材料的矿化及用于 股骨修复的研究
The mineralization of esterified agarose-based scaffold material and its application on femur repair
作者姓名:徐遵凯 指导教师姓名:汤顺清 及学位、职称:博士 研究员 学科、专业名称:生物医学工程 学位类型: (专业学位) 论文提交日期: 论文答辩日期: 答辩委员会主席: 论文评阅人: 学位授予单位和日期:
1. Esterified agarose fibrous membranes were fabricated by electrospun, and mineralization of the fibrous membranein vitro was further explored. The esterified agarose membrane was mineralized in the normal concentration simulated body fluid (SBF) for 15d and 30d, respectively. The XRD result showed there are characteristic peak of hydroxyapatite after 15d mineralization. The TGA showed that a high amount of hydroxyapatite mineralized in the membrane. The presence of hydroxyapatite can be observed by scanning electron microscopy and X-ray energy spectrum.
朱章志运用扶正祛邪法论治糖尿病经验
ʌ临证验案ɔ朱章志运用扶正祛邪法论治糖尿病经验❋曾绘域1,朱章志2ә,周㊀海3,陈㊀珺3,张文婧3(1.深圳市中西医结合医院,广东深圳㊀518104;2.广州中医药大学第一附属医院,广州㊀510405;3.广州中医药大学,广州㊀510405)㊀㊀摘要:糖尿病属于中医学 消渴病 范畴,以往医家多认为其病机为阴虚燥热,治疗以滋阴清热为法㊂朱章志教授通过长期的临床观察与实践,立足于张仲景 保胃气,扶阳气 的理论,认为糖尿病的病机为正虚邪滞,即太阴虚损㊁阳气不足㊁收敛不及,寒㊁水㊁湿之邪阻滞阳气运行通道㊂治疗上不囿陈法,以扶正祛邪为大法,通过固护太阴㊁扶助阳气㊁收敛阳气,祛除寒水湿之邪,恢复阳气运行之通畅,使阳气功能复常㊁运行有序,为糖尿病的治疗提供临床新思路㊂㊀㊀关键词:扶正祛邪;糖尿病;朱章志㊀㊀中图分类号:R587.1㊀㊀文献标识码:A㊀㊀文章编号:1006-3250(2021)01-0149-03Discussion on ZHU Zhang-zhi's Experience in Treating Diabetes Mellitus by Using The Method of Reinforcing The Healthy Qi and Eliminating The Pathogenic FactorsZENG Hui-yu 1,ZHU Zhang-zhi 2ә,ZHOU Hai 3,CHEN Jun 3,ZHANG Wen-jing 3(1.Shenzhen Hospital of Integrated traditional Chinese and Western Medicine,Guangdong,Shenzhen 518104,China;2.The First Affiliated Hospital of Guangzhou University of Chinese Medicine,Guangzhou 510405,China;3.Guangzhou University of Chinese Medicine,Guangzhou 510405,China)㊀㊀Abstract :Diabetes mellitus belongs to the category of "xiao ke"in traditional Chinese medicine.Doctors used to think that its pathogenesis was Yin deficiency and dryness heat ,and the treatment was nourishing Yin and clearing heat.Through long-term clinical observation and practice ,and based on ZHANG Zhong-jing's theory of protecting stomach Qi and supporting Yng Q ,professor ZHU Zhang-zhi believes that the pathogenesis of diabetes is deficiency of healthy Qi and stagnation of pathogen.Because of the deficiency of greater Yin and Yang Qi ,and the lack of convergence ,the cold ,water and dampness block the operational channel of Yang Qi.The treatment of diabetes mellitus should be based on reinforcing the healthy Qi and eliminating the pathogenic factors.By strengthening Taiyin ,supporting Yang Qi ,astringent Yang Qi ,dispelling the evil of cold ,water and dampness ,we can restore the smooth operation of Yang Qi ,restore the function of Yang Qi to normal and operate orderly ,which provides a new clinical method for the treatment of diabetes mellitus.㊀㊀Key words :Reinforcing the healthy Qi and eliminating the pathogenic factors ;Diabetes mellitus ;ZHU Zhang-zhi❋基金项目:国家自然科学基金资助项目(81873190)-降糖三黄片在糖脂毒性所致胰岛β细胞损伤的自噬调控作用作者简介:曾绘域(1990-),女,广东云浮人,住院医师,硕士研究生,从事六经辨治内分泌疾病的临床与研究㊂ә通讯作者:朱章志(1963-),男,湖南衡阳人,主任医师,博士研究生导师,从事六经辨治内分泌疾病的临床与研究,Tel :************,E-mail :zhuangi@ ㊂㊀㊀随着人口老龄化和生活方式的改变,我国糖尿病的患病率呈上升趋势,2013年我国18岁以上人群糖尿病患病率为10.4%[1]㊂中医药在延缓糖尿病的进展及防治其并发症方面具有一定优势[2-4]㊂糖尿病属于中医学 消渴病 范畴,以往医家多认为其病机为阴虚燥热,治疗以滋阴清热为法,但疗效尚不能令人满意㊂朱章志教授通过长期的临床观察与实践,认为正虚邪滞乃糖尿病病机之核心,采用扶正祛邪法治之屡获奇效㊂1㊀正虚邪滞之糖尿病病机‘素问㊃经脉别论篇“曰: 饮入于胃,游溢精气,上输于脾,脾气散精 水精四布,五经并行㊂食物入胃,经脾胃运化化生精气,然后输布全身㊂糖尿病患者常嗜食肥甘,起居无常,烦劳紧张,致太阴虚损,正气内虚,阳气戕伐,津液代谢异常,而生寒水湿之邪㊂寒㊁水㊁湿之邪气作为阴邪,又可阻滞阳气运行之通道㊂阳气运行通道不畅,不能敷布温煦四肢,可见手足逆冷;阳气运行受阻,又可出现郁而化热之象㊂因此朱章志认为,疗糖尿病的关键在于恢复阳气运行之通畅,根据糖尿病正虚邪滞的病机,治疗以扶正祛邪为法,顾护太阴㊁扶助阳气㊁收敛阳气,祛除寒水湿之邪,使阳气功能复常则行有序㊂2㊀运用扶正祛邪法治疗糖尿病2.1㊀扶正2.1.1㊀固护中气,扶助阳气㊀张仲景遣方用药常体现 保胃气 之思想[5],如桂枝汤中配伍生姜㊁大枣㊁炙甘草,发汗祛邪不忘顾护中气;又如白虎汤中加梗米㊁炙甘草以和中益胃,又可防止石膏㊁知母大寒伤中㊂ 有胃气则生,无胃气则死 ,故扶正之要以保胃气为先㊂朱章志认为,阳气在人体的生命活动中占主导9412021年1月第27卷第1期January 2021Vol.27.No.1㊀㊀㊀㊀㊀㊀中国中医基础医学杂志Journal of Basic Chinese Medicine地位㊂‘素问㊃生气通天论篇“曰: 阳气者若天与日,失其所则折寿而不彰 是故阳因而上,卫外者也㊂ ‘黄帝内经“把阳气比作太阳,阳气运行失常可致短寿㊂阳气具有抵御外邪㊁护卫生命㊁维持机体生命活动的作用,津液的气化㊁血液的运行均需阳气的温煦与推动㊂因此,在人体的阴阳平衡中阳气起着主导作用㊂朱章志认为,正气虚衰㊁太阴虚损㊁阳气不足是糖尿病发生发展之根本原因,因此扶正首当 固护中气,扶助阳气 ,故常以附子理中汤为底方,固护中宫㊂太阴脾土居中央,犹如足球比赛之中场,能联系前锋与后卫进可攻退可守,进可充养肺卫之气抵御外邪,退可顾护少阴以防寒邪内陷㊂‘四圣心源㊃卷二太阴湿土“提到: 湿者,太阴土气之所化也故胃家之燥,不敌脾家之湿,病则土燥者少而土湿者多也㊂[6] 阴脾土易挟寒湿,附子理中汤功善固护中气㊁温补脾阳而散寒湿,为治疗太阴阳虚寒湿之要方㊂方中附子辛温大热,补坎中真阳,又能散寒湿,荡去群阴;干姜去脏腑沉寒痼冷,温暖脾土,复兴火种;人参被誉为 百草之王 能大补元气,为扶正固本之极品;白术味苦性温,功善健脾燥湿,乃扶植太阴之要药;炙甘草善益气补中,调和药性,诸药合用以收培补中阳㊁散寒除湿之效㊂若其人神疲懒言,气虚较甚,在附子理中汤的基础上可重用红参㊁北芪以大补元气,健脾益气;若其人四肢不温㊁肢体困重㊁寒湿较重者,可加重附子㊁干姜之量,并加细辛㊁吴茱萸以散久寒;若其人口干口苦㊁舌苔黄腻㊁大便黏滞不爽兼夹湿热之象,可仿当归拈痛汤之意,加茵陈㊁当归㊁黄芩以利湿清热㊂2.1.2㊀收敛阳气,阳密乃固㊀朱章志认为, 阴 可理解为 阳气 的收敛㊁收藏状态,糖尿病 阴虚燥热 之象乃阳气不足㊁收敛不及㊁升发太过所致[7]㊂‘素问㊃生气通天论篇“提到: 阳气者,烦劳则张 ㊂现代人起居无节,以妄为常,阳气因而不能潜藏,常常浮越于外容易出现假热之象,医者不察,妄投清热泻火之品,实乃雪上加霜㊂ 凡阴阳之要,阳密乃固 ,收敛阳气即是扶正,犹如太极之能收能放,收敛是为了聚集能量,阳气固密,正气才能强盛,方能更好的制敌㊂朱章志常用砂仁㊁肉桂㊁白芍㊁山萸肉㊁泽泻等药物收敛阳气㊂砂仁辛温,既能宣太阴之寒湿,又能纳气归肾,使阳气收敛于少阴,少火生气㊂‘本草经疏“提到: 缩砂蜜,辛能散,又能润 辛以润肾,故使气下行 气下则气得归元㊂[8] 肉桂引火归原,导浮越之阳气归于命门,益火消阴㊂若患者出现咽痛㊁牙龈肿痛㊁痤疮等阳气不敛㊁虚火上冲之象,常用砂仁㊁肉桂以收敛阳气,纳气归肾,引火归原㊂白芍味酸能敛,敛降甲木胆火,使相火归位㊂‘本草求真“曰: 气之盛者,必赖酸为之收,故白芍号为敛肝之液,收肝之气,而令气不妄行也㊂[9] 朱章志常使用白芍以补肝之体㊁助肝之用,收敛肝气,肝平则郁气自除,火热自消㊂山萸肉秘精气㊁敛阳气,使龙雷之火归于水中㊂朱章志常用山萸肉收敛正气,遇汗出多者,常重用以固涩敛汗㊂泽泻能泻能降,能入肾泻浊,开气化之源,泻浊以利扶正,又能降气而引火下行㊂朱章志常用泽泻打通西方潜藏之要塞[10],在温阳之品中加入泽泻,利于阳气潜藏,使孤阳有归㊂2.1.3㊀填补阴精,以滋化源㊀‘素问㊃金匮真言论篇“提到: 夫精者,身之本也㊂ 精 是人体生命活动的物质基础,能化气生髓,濡养脏腑㊂人体之精禀受于父母,又由后天水谷之精不断充养,归藏于肾中㊂ 孤阴不生,独阳不长 ,无阳则阴无以生,无阴则阳无以化㊂肾乃水火之脏,阴精充足才能涵养坎中真火,使真阳固密于内,化生正气㊂朱章志常在秋冬之季嘱糖尿病患者进补阿胶等血肉有情之品填补肾精㊂肾主封藏,秋冬进补使肾精充养,以滋阳气化生之源㊂阿胶用黄酒烊化,既能祛除阿胶之腥,又能借黄酒通行之性解阿胶滋腻碍胃之弊,每日少量服用,以有形之精难以速生,填补肾精以缓补为要㊂除此之外,遣方用药时亦会注意顾护阴精,在使用温阳药的同时常常配伍山萸肉㊁白芍等养阴药,以防温燥伤阴之弊㊂2.2㊀祛邪2.2.1㊀外散寒水以运太阳㊀ 太阳为开 ,太阳乃三阳之表,巨阳也,其性开泄以应天,为祛邪之重要通道㊂在运气里,太阳在天为寒,在地为水,合而为太阳寒水㊂张仲景太阳病篇研究的是水循环过程,治太阳就是治水[11]㊂寒㊁水之邪闭郁在表,气血运行不畅,可见肌肤麻木不仁㊂邪气滞留太阳,阻碍阳气运行,当因势利导㊁开太阳之表以发汗,外散寒㊁水之邪㊂糖尿病患者正气亏虚为本,祛邪不能伤正,朱章志临床常用桂枝麻黄各半汤小发其汗,使玄府开张,邪有出路㊂桂枝麻黄各半汤乃发汗轻剂,为桂枝汤与麻黄汤相合而得,其中麻黄㊁桂枝㊁生姜㊁北杏发散宣肺以开皮毛,芍药㊁大枣㊁炙甘草酸甘化阴以益营,诸药相合,刚柔相济,祛邪而不伤正㊂邪去正安,阳气运行通畅,水液代谢复常则阳气自充,而无寒水之扰㊂若寒邪较重可用三拗汤,此为麻黄汤去桂枝而成,功善开宣肺气,疏散风寒,因去辛温之桂枝发汗力不及麻黄汤,祛邪而不伤正㊂2.2.2㊀下利水湿以健少阴㊀少阴乃水火交会之脏,元气之根,人身立命之本㊂‘医理真传“提到: 坎中真阳,一名龙雷火,发而为病,一名元阳外越,一名孤阳上浮,一名虚火上冲㊂此际之龙,乃初生之龙,不能飞腾而兴云布雨,惟潜于渊中,以水为家,以水为性,遂安其在下之位㊂水盛一分龙亦盛一分,水高一尺龙亦高一尺,是龙之因水盛而游 [12]㊂阴盛051中国中医基础医学杂志Journal of Basic Chinese Medicine㊀㊀㊀㊀㊀㊀2021年1月第27卷第1期January2021Vol.27.No.1则阳衰,水湿之邪泛滥,则龙雷之火因而飞越在外㊂叶天士深谙张仲景之理,提到 通阳不在温,而在利小便 [10,13],通过利小便的方法,使水湿之邪从下而解,阳气运行通道无水湿之邪阻碍,则阳气无需温养而自通,水盛得除则真龙亦安其位㊂朱章志常用五苓散㊁真武汤下利水湿,以复阳气之通达,少阴之健运㊂五苓散具有通阳化气利水之效,治疗膀胱气化不利形成的蓄水证㊂方中猪苓㊁茯苓㊁泽泻导水湿之邪下行;白术健脾燥湿,杜绝生湿之源;桂枝助膀胱气化,通阳化气行水又通气于表,使全身在表之湿邪皆得解,五药合用,膀胱气化复常,水道通调使小便得利,水湿得出㊂真武汤为治疗少阴阳虚㊁水气泛滥之主方,方中附子振奋少阴阳气,使水有所主;白术㊁茯苓健脾制水;生姜助附子敷布阳气,宣散水气;芍药利小便,制附㊁姜之燥,五味相合共奏温阳利水之功㊂2.2.3㊀开郁逐寒以畅厥阴㊀肝为将军之官,肝气主动主升发,能统帅兵马,捍卫君主㊂厥阴肝经,体阴用阳,内寄相火,相火敷布阳气,祛阴除寒,是祛邪的先锋主力军㊂朱章志常用吴茱萸汤祛除厥阴肝经之寒邪,恢复肝经阳气之运行㊂方中吴茱萸辛苦而温,芳香而燥,‘本草汇言“曰: 开郁化滞,逐冷降气之药 [14],能温胃暖肝,降浊阴止呕逆,为治疗肝寒之要药㊂配以生姜温胃散寒,佐以人参㊁大枣健脾益气补虚,全方散寒与降逆并施,共奏暖肝温胃㊁降逆止呕之效㊂‘素问㊃至真要大论篇“说: 帝曰:厥阴何也?岐伯曰:两阴交尽也㊂ 物极必反,重阴必阳㊂厥阴为阴尽阳生之脏,足厥阴肝经与足少阳胆经互为表里,若出现肝气不疏㊁枢机不利㊁气郁化火,朱章志常用小柴胡汤和畅枢机,开郁以复气机调达㊂方中柴胡疏泄肝胆之气;黄芩清泄胆火,一疏一清,气郁通达,火郁得发;生姜㊁半夏和胃降逆;人参㊁大枣㊁炙甘草固护中宫,全方寒温并用㊁补泻兼施,以复厥阴疏泄之职,使气机和畅㊁阳气运行有序㊂3㊀典型病案患者杨某,女,65岁,2017年3月10日初诊:2型糖尿病病史6年余,症见疲乏,双下肢轻度浮肿,下肢冰凉,背部易汗出,口苦口干,偶有腰膝酸软,纳眠可,二便调,舌淡暗,苔黄腻,脉沉细㊂辅助检查示糖化血红蛋白10.8%,空腹血糖14.59mmol/L,总胆固醇6.38mmol/L,甘油三酯3.66mmol/L,低密度脂蛋白胆固醇4.34mmol/L㊂西医诊断2型糖尿病㊁高脂血症,治疗给予门冬胰岛素30(早餐前22u晚餐前20u)控制血糖,阿托伐他汀钙片(20mg, qn)调脂㊂中医诊断消渴病,少阴阳虚寒湿证㊂患者少阴阳气衰微不足以养神,固见疲乏;腰为肾之府,少阴阳虚则见腰膝酸软,阳虚寒盛则见下肢冰凉;背部正中乃督脉运行之所,阳气虚衰无以固摄则见背部汗出;少阴阳虚不能主水,寒水泛滥则见双下肢浮肿;水湿内停有郁而化热之象,则见口苦口干㊁舌苔黄腻㊁舌淡暗,脉沉细为少阴阳虚寒湿之征,治以温阳散寒㊁利水除湿为法㊂方以扶正祛邪方合当归拈痛汤加减:炮附片10g(先煎1h),红参10g (另炖),干姜15g,白术30g,炙甘草15g,桂枝12 g,麻黄8g,生姜30g,猪苓10g,泽泻30g,茯苓30 g,白芍30g,酒萸肉45g,当归15g,茵陈10g,5剂水煎服,2d1剂,水煎至250ml,饭后分2次服用,次日复煎㊂方中以附子理中汤为底方温补中焦,散寒除湿;加桂枝㊁麻黄使寒湿之邪从皮毛而解;加五苓散通阳化气,使湿邪从下而出;生姜散寒除湿;白芍㊁酒萸肉收敛阳气,以助正气祛邪;当归活血利水;茵陈清热利湿㊂2017年3月24日二诊:患者双下肢浮肿减轻,疲乏较前好转,无口干口苦,无腰膝酸软,仍觉下肢冰凉,背部仍有汗出,动则尤甚,大便每日二行,质偏烂,舌淡暗,苔白腻,脉细㊂患者大便质烂,乃邪有出路,导水湿之邪从大便而解㊂患者无口干口苦,舌苔由黄腻转为白腻,知湿郁化热之象已除,遂去茵陈㊂仍觉下肢冰凉乃内有久寒,加制吴茱萸12g以散沉寒痼冷;上方加酒萸肉至60g以加强收敛阳气㊁固摄敛汗之效,加黄芪60g以健脾益气敛汗;加砂仁6g(后下)㊁肉桂3g(焗服)以加强收敛阳气㊁扶助正气之效,7剂水煎服,服法同前㊂2017年4月7日三诊:患者背部汗出减少,下肢转温,余症皆除,大便每日二行质软,舌淡红,苔薄白,脉细较前有力,继续服二诊方药5剂㊂后给予附子理中丸(每次8粒,每日3次)服用1个月巩固疗效㊂2017年11月17日复诊:患者上述症状皆除,纳眠可,二便调㊂复查糖化血红蛋白6.8%,空腹血糖6.5mmol/L,总胆固醇5.14mmol/L,甘油三酯1.65 mmol/L,低密度脂蛋白胆固醇2.43mmol/L㊂4㊀结语以往医家多以滋阴清热为法治疗糖尿病,通过长期的临床实践,朱章志不囿陈法,根据糖尿病患者当前之病因病机特点,运用扶正祛邪法治疗糖尿病,通过顾护太阴㊁扶助阳气㊁收敛阳气,祛除寒水湿之邪气,恢复阳气运行之通畅,为糖尿病的治疗提供新思路㊂参考文献:[1]㊀WANG L GAO-P-ZHANG-M,et al.Prevalence and EthnicPattern of Diabetes and Prediabetes in China in2013[J].JAMA,2017,317(24):2515-2523.[2]㊀谭宏韬,刘树林,朱章志,等. 首辨阴阳,再辨六经 论治惠州地区2型糖尿病的临床观察[J].中华中医药杂志,2018,33(9):4240-4244.(下转第181页)offspring of sleep-deprived mice[J].Psychoneuroendocrinology,2009,35(5):775-784.[9]㊀覃甘梅,覃骊兰.心肾不交型失眠动物模型研究进展[J].中华中医药杂志,2018,33(1):229-231.[10]㊀吕志平,刘承才.肝郁致瘀机理探讨[J].中医杂志,2000,41(6):367-368.[11]㊀游秋云,王平,田代志,等.老年肝郁失眠证候大鼠模型的建立和评价[J].中国实验方剂学杂志,2013,19(2):222-225. [12]㊀唐仕欢,杨洪军,黄璐琦. 以方测证 方法应用的反思[J].中国中西医结合杂志,2007,27(3):259-262.[13]㊀卢岩,刘振华,于晓华,等.疏肝调神针法针刺对睡眠剥夺模型大鼠神经递质的影响[J].山东中医杂志,2017,36(4):322-325. [14]㊀YANG CR,SEAMANS JK,GORELOVA N.Developing aneuronal model for the pathophysiology of schizophrenia based onthe nature of electrophysiological actions of dopamine in theprefrontal cortex[J].Neuropsychopharmacology,1999,21(2):161-194.[15]㊀何林熹,诸毅晖,杨翠花,等.失眠肝郁化火证大鼠模型的建立及其评价[J].中华中医药杂志,2018,33(9):3890-3894. [16]㊀李越峰,徐富菊,张泽国,等.四逆散对大鼠睡眠时相影响的实验研究[J].中国临床药理学杂志,2014,30(10):936-938. [17]㊀张晓婷,刘文超,刘俊昌,等.电击法建立SD大鼠焦虑型心理应激-失眠模型的研究[J].现代中西医结合杂志,2018,27(30):3316-3319.[18]㊀钱伯初,史红,郑晓亮.新的失眠动物模型研究概述[J].中国新药杂志,2008,17(1):1-4.[19]㊀朱洁,申国明,汪远金,等.肝郁证失眠大鼠模型的建立与评价[J].中医杂志,2011,52(8):689-692.[20]㊀刘倩,李蜀平,廖磊,等.调和肝脾方治疗失眠的实验研究[J].北京中医药,2018,37(8):768-770.[21]㊀全世建,焦蒙蒙,黑赏艳,等.交泰丸对睡眠剥夺大鼠下丘脑Orexin A及γ-氨基丁酸的影响[J].广州中医药大学学报,2015,32(1):103-105.[22]㊀KOBAN M,SWINSON KL.Chronic REM-sleep deprivation ofrats elevates metabolic rate and increases UCP1gene expressionin brown adipose tissue[J].Am J Physiol Endocrinol Metab,2005,289(1):68-74.[23]㊀赵俊云,杨晓敏,胡秀华,等.失眠动物模型HPA轴和表观遗传修饰的变化及交泰丸的干预作用[J].中医药学报,2018,46(4):19-21.[24]㊀GORGULU Y,CALIYURT O.Rapid antidepressant effects ofsleep deprivation therapy correlates with serum BDNF changes inmajor depression[J].Brain Res Bull,2009,80(3):158-162.[25]㊀BENCA RM,PETERSON MJ.Insomnia and depression[J].Sleep Med,2008,9(1):S3-S9.[26]㊀郜红利,涂星,卢映,等.心肾不交所致失眠大鼠模型[J].中成药,2014,36(6):1138-1141.[27]㊀杨钰涵,孙雨,王珺,等.中医病证相符的大鼠心肾不交失眠模型的建立及其血清代谢组学研究[J].中国中药杂志,2020,45(2):383-390.[28]㊀石皓月,鲁艺,李钰昕,等.中药治疗对氯苯丙氨酸失眠模型大鼠影响的基础研究进展[J].中国医药导报,2018,15(11):33-36.[29]㊀全世建,何树茂,钱莉莉.交泰丸交通心肾治疗失眠作用机理研究[J].辽宁中医药大学学报,2011,13(8):12-14. [30]㊀GULEC M,OZKOL H,SELVI Y,et al.Oxidative stress inpatients with primary insomnia[J].Pro NeuropsychopharmacolBiol Psychiatry,2012,37(2):247-251.[31]㊀ZHANG H,CAO D,CUI W,et al.Molecular bases ofthioredoxin and thioredoxin reductase-mediated prooxidant actionsof(-)-epigallocatechin-3-gallate[J].Free Radic Biol Med,2010,49(12):2010-2018.[32]㊀谢光璟,刘源才,胡辉,等.基于Trx系统介导的抗氧化应激探讨天王补心方对失眠模型大鼠的干预作用[J].时珍国医国药,2019,30(4):805-808.[33]㊀黄攀攀,王平,李贵海,等.老年阴虚失眠动物模型的建立与评价[J].中华中医药学刊,2010,28(8):1719-1723.[34]㊀XIONG L,HUANG XJ,SONG PX.The experiment ofstudymodel of Deficiency of yin Insomnia by Yangyin anshenkoufuye[J].Chin J Pract Chin Mod Med,2005,18(18):1187-1188.[35]㊀韦祎,唐汉庆,李克明,等.脾阳虚证失眠大鼠模型的建立和附子理中汤的干预效应[J].中国实验方剂学杂志,2013,19(16):289-292.[36]㊀王志鹏.桂枝甘草龙骨牡蛎汤对阳虚证失眠大鼠脑内5-HT㊁NE含量的影响[D].南京:东南大学,2015.[37]㊀MURRAY NM,BUCHANAN GF,RICHERSON GB.InsomniaCaused by Serotonin Depletion is Due to Hypothermia[J].Sleep,2015,38(12):1985-1993.[38]㊀宋亚刚,李艳,崔琳琳,等.中医药病证结合动物模型的现代应用研究及思考[J].中草药,2019,50(16):3971-3978. [39]㊀李晓娟,白晓晖,陈家旭,等.中医动物模型研制方法及展望[J].中华中医药杂志,2014,29(7):2263-2266.[40]㊀刘臻,谢晨,赵娜,等.失眠动物模型的制作与评价[J].中医学报,2013,28(12):1846-1848.收稿日期:2020-05-18(上接第151页)[3]㊀司芹芹,牛晓红,杨海卿,等.温阳益气养阴活血方治疗2型糖尿病肾病的临床疗效[J].中华中医药学刊,2018,36(3):703-705.[4]㊀郭仪,石岩.中药复方治疗糖尿病大血管病变临床疗效及对血糖㊁血脂影响的系统评价[J].中华中医药学刊,2017,35(6):1369-1375.[5]㊀方春平,刘步平,朱章志.‘伤寒论“中 胃气 思想在病脉辨证中的运用[J].浙江中医药大学学报,2014,38(8):948-950.[6]㊀黄元御.四圣心源[M].北京:中国中医药出版社,2009:24.[7]㊀朱章志,林明欣,樊毓运.立足 阳主阴从 浅析糖尿病的中医治疗[J].江苏中医药,2011,43(4):7-8.[8]㊀缪希雍.本草经疏[M].北京:中国医药科技出版社,2011:56.[9]㊀黄宫绣.本草求真[M].北京:中国中医药出版社,2008:132.[10]㊀林明欣,裴倩,朱章志.浅析 通阳不在温,而在利小便 [J].中医杂志,2011,52(19):1705-1706.[11]㊀刘力红.思考中医[M].桂林:广西师范大学出版社,2006:457.[12]㊀郑寿全.医理真传[M].北京:中国中医药出版社,2008:3.[13]㊀刘涛,张毅,李娟,等.结合‘伤寒论“探讨 通阳不在温而在利小便 [J].中国中医药信息杂志,2017,24(9):106-107.[14]㊀倪朱谟.本草汇言[M].北京:中医古籍出版社,2010:87.收稿日期:2020-04-27。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS
2
Department of Information Technology, Al-Azhar University-Gaza, Gaza, Palestine Department of Computer Engineering, Eastern Mediterranean University, Famagusta, North Cyprus 1 ahmed@.ps, 2alexander.chefranov@.tr the key matrix rows, and it may be used as a characteristic of its security. But permutations in HCMPT are transferred HC-encrypted, which means that master key matrix can be revealed by the KPCA on the transferred encrypted permutations [10]. Modification [8], HCM-NPT, works as HCM-PT does, but without permutations transfer; instead, both communicating parties use a pseudo-random permutation generator, and only the consecutive number of the necessary permutation is transferred to the receiver. It has good computational complexity and the number of its dynamic keys is the same as for HCM-PT, but [11] shows that HCM-NPT is not effective in the encryption quality of RGB bitmap images in the case of images with large single colour areas. Another HC modification [9], HILLMRIV, also uses dynamic key matrices: it modifies each row of the matrix key by multiplying the current key by a secret initial vector. But HILLMRIV is still vulnerable to KPCA [12], [13]. Another HC modification [10], HCM-H, also uses dynamic key matrix produced with the help of a one way hash function applied to an integer picked up randomly by the sender to get the key matrix, and a vector added to the product of the key matrix with a plain text. HCM-H is vulnerable [14] to chosen-ciphertext attack because the selected random number is transmitted in clear over the communication link and is repeated. To avoid this random number transfer, a modification of HCM-H [14], HCM-HMAC, uses only a seed value secure transfer, and then both parties generate necessary numbers synchronously, where HMAC is a hash function, e.g., MD5[15], SHA-1[16]. The difference between HCM-H and HCM-HMAC is similar to the difference between HCM-PT and HCM-NPT. Despite these improvement, the Hill cipher still either susceptible to the KPCA or ineffective in image encryption in the case of images with large single colour area. Up to now, HC modifications consider the dynamic keys as the major solution for enhancing the security and reducing the risk of cryptanalysis of the HC. However, using the dynamic keys is not always the best solution, since the generated keys are dependent on the initial parameters. In this paper, we propose an extension of the HC modification, HCM-EE [11]. HCM-EE generates dynamic encryption key matrix efficiently with the help of eigenvalues; it uses the eigenvalues for matrix exponentiation to a pseudo-random power for a new key
1Ahmed Y. Mahmo Nhomakorabead1, Alexander G. Chefranov2
Abstract—All the proposed Hill cipher modifications have been restricted to the use of dynamic keys only. In this paper, we propose an extension of Hill cipher modification based on eigenvalues HCM-EE, called HCM-EXDKS. The proposed extension generating dynamic encryption key matrix by exponentiation that is made efficiently with the help of eigenvalues, HCMEXDKS introduces a new class of dynamic keys together with dynamically changing key size. Security of HCMEXDKS is provided by the use of a large number of dynamic keys with variable size. The proposed extension is more effective in the encryption quality of RGB images than HCM-EE and Hill cipher-known modifications in the case of images with large single colour areas and slightly more effective otherwise. HCM-EXDKS almost has the same encryption time as HCM-EE, and HCMHMAC. HCM-EXDKS is two times faster than HCM-H, having the best encryption quality among Hill cipher modifications compared versus HCM-EXDKS. Index Terms—Hill cipher, eiqenvalue exponentiation, pseudorandom number, dynamic key, dynamic key size, image encryption. I. INTRODUCTION The Hill cipher (HC) is a well-known symmetric cryptosystem [1], [2]. The core of HC is matrix manipulations; it multiplies a plaintext vector by a key matrix to get the ciphertext. The HC is extremely secure against ciphertext only and brute force attacks. That is because the key space is extremely large, due to choosing the matrix elements from a large set of integers [3], it is also resistant to the frequency letter analysis, but it can be broken by the known plaintext-ciphertext attack (KPCA) [4], [5], [6], [7]. The key matrix can be calculated easily from a set of known plaintext-ciphertext pairs. The vulnerability of the HC to the KPCA makes it unusable in practice. Security of HC was improved in [5], [8], [9], [10]. One of proposed their methods, HCM-PT, uses a dynamic key matrix obtained by permutations of rows and columns from the master key matrix to get every next ciphertext, and transfers it together with an HC-encrypted permutation to the receiving side. Thus, in HCM-PT, each plaintext vector is encrypted by a new dynamic key matrix that prevents the KPCA; the number of possible dynamic keys is equal to the number of permutations of Copyright © 2014 MECS