-
Article
Aquaculture activities influencing the generation of geosmin and 2-methylisoborneol: a case study in the aquaculture regions of Hongze Lake, China
Contamination by odor substances such as geosmin (GSM) and 2-methylisoborneol (2-MIB) was examined in the cultured water from aquaculture farming in the region of the Hongze Lake in 2022, and some factors infl...
-
Article
Quantitative benefit and risk assessment of arsenic and nutrient levels in tilapia products sold on Chinese e-commerce platforms
E-commerce platforms have become a significant sales channel for processed tilapia products such as frozen tilapia fillets, pickled tilapia, and canned tilapia in China. As food safety issues are worldwide con...
-
Article
Native and engineered exosomes for inflammatory disease
Exosomes are extracellular vesicles which carry specific molecular information from donor cells and act as an intercellular communication vehicle, which have emerged as a novel cell-free strategy for the treat...
-
Article
Risk and benefit assessment of potential neurodevelopment effect resulting from consumption of cultured largemouth bass (Micropterus salmoides) in China
The aim of this study was to evaluate the net effects of dietary consumption on the potential neurodevelopmental effects of largemouth bass (Micropterus Salmoides, simplify as bass) cultured in China, especially ...
-
Chapter and Conference Paper
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
The deterministic ECDSA and EdDSA signature schemes have found plenty of applications since their publication, e.g., block chain and Internet of Thing, and have been stated in RFC 6979 and RFC 8032 by IETF res...
-
Article
Antibiotic accumulation, growth performance, intestinal diversification, and function of Nile tilapia (Oreochromis niloticus) feed by diets supplemented with different doses of sulfamethoxazole
To comprehensively investigate the effects of exposure to legal doses of sulfamethoxazole (SMZ) in Nile tilapia (Oreochromis niloticus), fishes were exposed to diets supplemented with different doses of SMZ (NS, ...
-
Article
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure
-
Article
Effects of fenvalerate concentrations and its chiral isomers on bacterial community structure in the sediment environment of aquaculture ponds
To investigate the effect of chiral pesticide fenvalerate (FV) on the micro-ecological environment of aquaculture pond sediment, we used an indoor static experiment to observe the effects of FV added at differ...
-
Article
Open AccessImpact of coal mining on groundwater of Luohe Formation in Binchang mining area
Groundwater of Luohe Formation is the main water source for industrial and agricultural and residential use in Binchang mining area, which is one of the key elements to water conservation coal mining. However,...
-
Article
Open AccessWater-conserving mining influencing factors identification and weight determination in northwest China
Water-conserving mining is an effective way to alleviate the contradiction between fragile ecological environment and high-intensity coal mining in the arid and semi-arid region of northwest China. It needs to...
-
Article
Effect of Chronic Exposure to Methomyl on Tissue Damage and Apoptosis in Testis of Tilapia (Oreochromis niloticus) and Recovery Pattern
Tilapia were exposed to 0, 0.2, 2, 20, 200 µg/L methomyl for 30 days, and then transferred to methomyl-free water for 18 days. Caspase-8 in serum, apoptosis rate, microstructure and ultra-microstructure of tes...
-
Article
Effects of multiple environmental factors on elimination of fenvalerate and its cis-trans isomers in aquaculture water
Fenvalerate (FV) is widely used in aquaculture because of their broad spectrums and high efficiency. However, little is known regarding the elimination of FV influenced by environment factors in aquaculture wa...
-
Article
A new discrete Fourier transform randomness test
The randomness of random number generators (RNGs) is important for the reliability of cryptographic systems since the outputs of RNGs are usually utilized to construct cryptographic parameters. Statistical tes...
-
Chapter and Conference Paper
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Ring oscillator-based true random number generators (RO-based TRNGs) are widely used to provide unpredictable random numbers for cryptographic systems. The unpredictability of the output numbers, which can be ...
-
Article
Open AccessA review on investigation of water-preserved coal mining in western China
Yushenfu mining area is located in an ecological fragile area in western China, the coal seam of which is the Jurassic Yan’an Formation. The Jurassic Yan’an Formation contains five minable coal seams, the top ...
-
Article
Archaeal community compositions in tilapia pond systems and their influencing factors
Archaea, like the bacterial communities are gradually being realized as key players in the biogeochemical progress of water ecosystems. In this study, tilapia aquaculture ponds were used for an in-depth unders...
-
Chapter and Conference Paper
Lattice-Based Fault Attacks Against ECMQV
ECMQV is a standardized key agreement protocol based on ECC with an additional implicit signature authentication. In this paper we investigate the vulnerability of ECMQV against fault attacks and propose two e...
-
Article
Methanogenic community compositions in surface sediment of freshwater aquaculture ponds and the influencing factors
Aquaculture ponds represent ecologically relevant environments to study the community composition and diversity of methanogenic assemblages, as well as their interactions with cultivated species and chemical i...
-
Article
Occurrence and human dietary assessment of sulfonamide antibiotics in cultured fish around Tai Lake, China
As the most important fishery medicines, sulfonamides are widely used to prevent diseases caused by pathogens in aquaculture. However, relatively little is known about the residues and dietary risks associated...
-
Chapter and Conference Paper
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses
In side channel attack (SCA) studies, it is widely believed that unprotected implementations leak information about the intermediate states of the internal cryptographic process. However, directly recovering t...