0000000000148457

AUTHOR

Nan Zhao

showing 8 related works from this author

Molecular systematics and phytochemistry of Rehmannia (Scrophulariaceae)

2007

Abstract The relationships between the six known species of Rehmannia were investigated. With regard to the content of iridoid glucosides, caffeoyl phenylethanoid glycosides (CPGs) and ionone glucosides, no conclusions could be drawn. Phylogenetic analysis of DNA sequence data (ITS region, trnL-F region and rps 16 intron) reveal a well-resolved topology in which Rehmannia glutinosa and Rehmannia solanifolia and Rehmannia piasezkii and Rehmannia elata are well-supported species pairs. Rehmannia chingii is sister to the rest of the genus, which is congruent with its distribution distant to the other species of the genus.

biologyScrophulariaceaeRehmannia elataIridoid GlucosidesPhenylethanoidRehmannia glutinosabiology.organism_classificationBiochemistrychemistry.chemical_compoundchemistryChemotaxonomyBotanyMolecular phylogeneticsRehmanniaEcology Evolution Behavior and SystematicsBiochemical Systematics and Ecology
researchProduct

UAV-Aided Secure Short-Packet Data Collection and Transmission

2023

Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned aerial vehicle (UAV) has gained tremendous attention in data collection for wireless sensor networks. However, the high-quality air-ground channels also pose significant threats to the security of UAV aided wireless networks. In this paper, we propose a short-packet secure UAV-aided data collection and transmission scheme to guarantee the freshness and security of the transmission from the sensors to the remote ground base station (BS). First, during the data collection phase, the trajectory, the flight duration, and the user scheduling are jointly optimized with the objective of maximizing t…

finite blocklengthdata collectionsecure transmissionInternet of Thingseavesdroppingsensoriverkotresource allocationshort-packet transmissionlangaton tekniikkamiehittämättömät ilma-aluksetsensorstiedonsiirtodatatietoliikennetrajectoryunmanned aerial vehicleesineiden internetElectrical and Electronic Engineeringautonomous aerial vehicleswireless sensor networksIEEE Transactions on Communications
researchProduct

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct

IEEE Access Special Section Editorial : Cloud and Big Data-Based Next-Generation Cognitive Radio Networks

2019

In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the resource allocation and interference ma…

General Computer Sciencebusiness.industryComputer scienceBig dataGeneral EngineeringCloud computingInterference (wave propagation)Spectrum managementpilvipalvelutlangaton tiedonsiirtoCognitive radioResource allocationResource allocation (computer)General Materials Sciencelcsh:Electrical engineering. Electronics. Nuclear engineeringkognitiivinen radiobusinesslcsh:TK1-9971Information exchangeComputer network
researchProduct

Wireless Caching Aided 5G Networks

2018

Article SubjectComputer Networks and CommunicationsComputer science5G-tekniikka0102 computer and information sciences02 engineering and technology01 natural scienceslcsh:Technologylcsh:Telecommunicationlcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringwireless cachingta213business.industrylcsh:T020206 networking & telecommunications010201 computation theory & mathematicsnetworksbusiness5G5Glangattomat verkotInformation SystemsComputer networkWireless Communications and Mobile Computing
researchProduct

Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden

2021

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterProcess (computing)020206 networking & telecommunicationsJammingEavesdroppingThroughputData_CODINGANDINFORMATIONTHEORY02 engineering and technologyTransmitter power outputPower (physics)Covert0202 electrical engineering electronic engineering information engineeringbusinessComputer network2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)
researchProduct

Topoisomerase 1 inhibition suppresses inflammatory genes and protects from death by inflammation

2015

Unwinding DNA and unleasing inflammation Fighting infections often comes with collateral damage, which sometimes can be deadly. For instance, in septic shock, the overwhelming release of inflammatory mediators drives multi-organ failure. Rialdi et al. now report a potential new therapeutic target for controlling excessive inflammation: the DNA unwinding enzyme topoisomerase I (Top1) (see the Perspective by Pope and Medzhitov). Upon infection, Top1 specifically localizes to the promoters of pathogen-induced genes and promotes their transcription by helping to recruit RNA polymerase II. Pharmacological inhibition of Top1 in a therapeutic setting increased survival in several mouse models of s…

0301 basic medicineTranscription GeneticType IInbred C57BLmedicine.disease_causeSendai virusMicePiperidinesTranscription (biology)Influenza A virusInnate2.1 Biological and endogenous factorsPositive Transcriptional Elongation Factor BAetiologyMultidisciplinaryAzepinesStaphylococcal InfectionsEbolavirusInfectious DiseasesDNA Topoisomerases Type IInfluenza A virusEbolaHost-Pathogen InteractionsPneumonia & InfluenzaRNA Polymerase IImedicine.symptomInfectionTranscriptionStaphylococcus aureusGeneral Science & TechnologyInflammationBiologyVaccine Related03 medical and health sciencesImmune systemGeneticImmunityBiodefenseGeneticsmedicineAnimalsHumansGeneFlavonoidsInflammationInnate immune systemPreventionHEK 293 cellsImmunityInterferon-betaHemorrhagic Fever EbolaTriazolesImmunity InnateMice Inbred C57BLEmerging Infectious DiseasesGood Health and Well BeingHEK293 Cells030104 developmental biologyGene Expression RegulationImmunologyCancer researchHemorrhagic FeverCamptothecinTopoisomerase I InhibitorsTopotecanDNA TopoisomerasesScience
researchProduct

UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens

2021

In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…

Transmission (telecommunications)Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterMulti antennaReal-time computingCovert communicationComputerApplications_COMPUTERSINOTHERSYSTEMSJammingData_CODINGANDINFORMATIONTHEORYOutage probabilityTransmitter power outputSignalICC 2021 - IEEE International Conference on Communications
researchProduct